Article Details

How should undocumented features in software be addressed?

Retrieved on: 2018-01-02 21:52:30

Tags for this article:

Click the tags to see associated articles and topics

How should undocumented features in software be addressed?. View article details on hiswai:

Excerpt

<div>In reality, most if not all of these so-called proof-of-concept attacks are undocumented features that are at the root of what we struggle with in security. We don't know what we don't know, and that creates intangible business risks. The <b>software</b> flaws that we do know about create tangible risks. Either way ...</div>

Article found on:

View Original Article

This article is found inside other hiswai user's workspaces. To start your own collection, sign up for free.

Sign Up
Book a Demo