To be fair, plenty of "regular devs" skip the first part 2, and then try to find away to shoehorn security after the fact. Source: over a decade working in embedded software in a corporate environment.
"well there isn't a requirement that says my product needs to be secure"
Please Login to reply.
No replies yet.