Can you trust and verify the software you are using (or developed internally) is secure, safe, and functions as intended? Do you know where the software was developed, who maintains is, how it is maintained, and how it is changed? In this age of increasing cyberattacks, these questions are now an imperative. Listen in for some insight into this very important topic.