A common, but not especially useful, cybersecurity rhetorical device.
1
Putting a definition out there.
3
2
A look at the rivetingly titled M-22-18.
1
What Uncle Sam says about vulnerability management: Part III.
1
Studies examining the risk posed by CVEs.
2
1
What Uncle Sam says about vulnerability management: part II.
2
A look into recent NDAA provisions about software security.
1
SaaSBOMs can provide greater visibility into the makeup of cloud-based software and infrastructure.
1
How to speed up development while still deploying securely.
2
What Uncle Sam says about vulnerability management: Part I.
2
And how you should use them.
2
How to not shoot yourself in the foot.
1
1