This part presents a number of security-related scenarios that may arise in real-world projects.
AdaCore Technologies for cyber security, part 3: Security vulnerabilities and their mitigation - BlogJuly 03, 2018
Part three considers a number of specific and high-profile software vulnerabilities, inspired by the CWE/SANS ?Top 25 Most Dangerous Software Errors."
This article considers why building and operating secure computer systems appears to be so difficult, as evidenced by the frequency and magnitude of attacks reported in the media.
We're all serious about security, some more than others. This first in a series of articles on cyber-security shows that it's really necessary and it's really possible to be secure.