-
Getting daily warning email, probably most of us are getting this.
```
Warning! thesofproject / sof-docs
Known security vulnerabilities detected
Dependency Pillow Version < 10.0.1 Upgrade to…
-
**Functional Requirements:**
Log Aggregation and Parsing:
Functional: Ability to aggregate logs from Firewall, IDS/IPS, Endpoint, and server sources.
Functional: Parsing logs for relevant information…
-
Fix some of potential security vulnerability package in requirements.txt
`pyca/cryptography`
![image](https://user-images.githubusercontent.com/7929947/46646540-f634b000-cbb4-11e8-9bbd-c386ae41c0d9.…
-
## User Story
In order to simplify dependency management, O&M personnel wants dependencies managed in such a way that snyk and dependabot PRs can be utilized as is.
## Acceptance Criteria
[ACs …
-
## Summary
Eureka simplifies and improves IBC retaining the positive elements - light client based security model, the packet life cycle, permissionless relay, whilst removing many of the negative …
-
Similar to what's been done for ASVS and WSTG:
- https://owasp.org/www-project-application-security-verification-standard/#how-to-reference-asvs-requirements
- https://owasp.org/www-project-web-secu…
-
### This is a ...
fix - something needs to be different
### This relates to ...
- the **Guide to OSCAL-based FedRAMP System Security Plans (SSP)**
- the **FedRAMP SSP OSCAL Template** (JSON …
-
|Wazuh version|Component|Install type|Install method|Platform|
|---|---|---|---|---|
| 3.1x-rev | Ruleset, API, App, templates, etc. | Manager | Packages/Sources | N/A |
Hello Team,
this issue…
-
Attempting to get access to MHV data to be able to report in conjunction with AVS Data
Requirements
- [x] Connect with Theresa Hancock
- [ ] Meet requirements to get access to data/security
- [ ] Get…
-
Managers who oversee software developers also need education!
First, they need "why it matters" - including past $ fines, big events, etc.
They also need to know *what* software developers need …