This voluntary guidance provides an overview of product security bad practices that are deemed exceptionally risky, particularly for software manufacturers who produce software used in service of critical infrastructure or national critical functions (NCFs).| Cybersecurity and Infrastructure Security Agency CISA
Security by design is the practice of developing software and hardware to prevent security vulnerabilities and mitigate security risks.| Sternum IoT
NIST’s Secure Software Development Framework (SSDF) is a structured approach that provides guidelines and best practices for integrating security throughout the software development life cycle (SDLC).| wiz.io
Without great security, sophisticated actors can steal AI model weights. Thieves are likely to deploy dangerous models incautiously; none of a lab’s deployment-safety matters if another actor deploys the models without those measures.| ailabwatch.org
Google announces the Coalition for Secure AI (CoSAI) alongside founding member organizations.| Google
In this post we will provide an update on Google's open source security efforts.| Google
How to build secure crypto wallets, analysing issues found during crypto wallet security audits.| Cossack Labs