mfigueiredo@lemmy.world to Programming@programming.dev · 9 months agoWhy Bloat Is Still Software’s Biggest Vulnerabilityspectrum.ieee.orgexternal-linkmessage-square6fedilinkarrow-up164arrow-down11cross-posted to: security@lemmy.mlbecomeme@sh.itjust.workshackernews@lemmy.smeargle.fanstechnology@lemmy.zip
arrow-up163arrow-down1external-linkWhy Bloat Is Still Software’s Biggest Vulnerabilityspectrum.ieee.orgmfigueiredo@lemmy.world to Programming@programming.dev · 9 months agomessage-square6fedilinkcross-posted to: security@lemmy.mlbecomeme@sh.itjust.workshackernews@lemmy.smeargle.fanstechnology@lemmy.zip
minus-squareonlinepersona@programming.devlinkfedilinkEnglisharrow-up2·9 months agoIMO, some things will require obligatory security checks. They will have to be legally binding too. Then businesses might be forced to care. Without any consequences, nobody will care until something happens. CC BY-NC-SA 4.0
IMO, some things will require obligatory security checks. They will have to be legally binding too. Then businesses might be forced to care.
Without any consequences, nobody will care until something happens.
CC BY-NC-SA 4.0