mfigueiredo@lemmy.world to Programming@programming.dev · 1 year agoWhy Bloat Is Still Software’s Biggest Vulnerabilityspectrum.ieee.orgexternal-linkmessage-square5fedilinkarrow-up164arrow-down11cross-posted to: security@lemmy.mlbecomeme@sh.itjust.workshackernews@lemmy.smeargle.fanstechnology@lemmy.zip
arrow-up163arrow-down1external-linkWhy Bloat Is Still Software’s Biggest Vulnerabilityspectrum.ieee.orgmfigueiredo@lemmy.world to Programming@programming.dev · 1 year agomessage-square5fedilinkcross-posted to: security@lemmy.mlbecomeme@sh.itjust.workshackernews@lemmy.smeargle.fanstechnology@lemmy.zip
minus-squareonlinepersona@programming.devlinkfedilinkEnglisharrow-up2·1 year agoIMO, some things will require obligatory security checks. They will have to be legally binding too. Then businesses might be forced to care. Without any consequences, nobody will care until something happens. CC BY-NC-SA 4.0
IMO, some things will require obligatory security checks. They will have to be legally binding too. Then businesses might be forced to care.
Without any consequences, nobody will care until something happens.
CC BY-NC-SA 4.0