-
There are a couple EU laws coming, that require users to gather information of all their software dependencies in order to conduct cyber security assessments, and use this as part of managing their so…
-
A number of WGs have interest in formal standardization efforts.
One good example reviewed in this the TAC call earlier today was S2C2F:
1. S2C2F is working with LF's OpenChain on alignment withi…
-
Comments: OMB Improving Cyber Security Protections in Federal Acquisitions
Don O'Neill
Independent Consultant
ONeillDon@aol.com
1. Security Controls
As a minimum security controls must include thr…
-
## Issue
### **What is the issue?**
An error happens when trying to import a mapping after populating the database from upstream
### Expected Behaviour
When I run the import on an empty d…
-
Reticketed from https://github.com/chadwhitacre/openpath/issues/39. This is a BFD.
The **Cyber Resilience Act (CRA)** is a piece of European Union legislation that regulates software as a product. …
-
### Problem Statement
High Value Targets (HVTs) are information systems for which unauthorized access, use, disclosure, disruption, modification, or destruction could cause a significant impact to an…
-
Mr. Liddell, Mr. Wilmer,
My name is Tracie Berardi, program manager of the Consortium for IT Software Quality (CISQ).
I read the IT Moderniz…
-
Hey everyone,
Sorry for the long post (I've tried to keep it interesting).
Feel free to comment/ask questions about anything here **(some specific questions at the bottom)**.
---
I've been…
-
### Description
Announcement from AWS: https://aws.amazon.com/about-aws/whats-new/2024/08/general-availability-aws-backup-logically-air-gapped-vault/
Dev Guide: https://docs.aws.amazon.com/aws-b…
-
2 starting feats, plus those from occupation, plus those from class.
Feat#name
String Feat#validate(Character) //checks if already has it by default
Feat#apply(Character)
Feat#a…