hi sc-l, Greetings from NOLA where I am sailing this weekend.
Ever wonder what the twelve most common software security activities are? Because of the BSIMM data, we actually know. Have a look for yourself: http://searchsecurity.techtarget.com/news/2240174114/Twelve-common-software-security-activities-to-lift-your-program gem company www.cigital.com podcast www.cigital.com/silverbullet blog www.cigital.com/justiceleague book www.cigital.com _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________