Software Security for Buyers and Government - SAFECode: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Replaced via script) |
(Updated description via script) Tag: Reverted |
||
Line 1: | Line 1: | ||
=Description= | =Description=<br> | ||
<br> | There is no “secret sauce” for creating secure software. It is achieved through the successful execution of a holistic, scalable assurance process that should be transparent to those seeking to evaluate the security of the software they use.=More Information= | ||
There is no “secret sauce” for creating secure software. It is achieved through the successful execution of a holistic, scalable assurance process that should be transparent to those seeking to evaluate the security of the software they use. | |||
=More Information= | |||
<br> | <br> | ||
https://safecode.org/category/resource-buyers-and-government/ | https://safecode.org/category/resource-buyers-and-government/ |
Revision as of 04:50, 23 April 2024
=Description=
There is no “secret sauce” for creating secure software. It is achieved through the successful execution of a holistic, scalable assurance process that should be transparent to those seeking to evaluate the security of the software they use.=More Information=
https://safecode.org/category/resource-buyers-and-government/