October 13, 2020

Threats mitigation

    Threats to applications or software require mitigation. Mitigation can be accomplished in four ways: redesign to eliminate vulnerability, apply a standard mitigation, invent a […]