How to develop a defensive plan for your open-source software project
Open source software is becoming more and more popular. Here's how you can create a plan to ensure that your open source implementation is secure as well as effective.
Sam Bocetta is a freelance journalist specializing in cybersecurity policy and cryptography. Previously, Sam was a defense contractor for the DoD. He worked in partnership with architects and developers to identify mitigating controls for vulnerabilities identified across applications, and performed security assessments to emulate the tactics, techniques, and procedures of a variety of threats.
Open source software is becoming more and more popular. Here's how you can create a plan to ensure that your open source implementation is secure as well as effective.