Search results
132 results
Sort by:
Minutes for November 12, 2015
Approval of the Membership Committee, Discussion of goals for the year
Minutes for November 24, 2015
Minutes for October 29, 2015
First meeting of the new board: appointment of officers and liaisons
Nominations
List of nominations for the Plone Foundation Board 2022-2023
Nominations overview
Nominations overview
Nominations overview
Nominations overview
Paul Roeland
integrator, open source activist and non-profit tech person. Currently on the Board.
Paul Roeland
integrator, open source activist and non-profit tech person. Currently on the Board.
Paul Roeland
integrator, open source activist and non-profit tech person. Currently on the Board.
Paul Roeland
Integrator, open source activist and non-profit tech person. Currently on the Board.
Paul Roeland
Integrator, open source activist and non-profit tech person. Currently on the Board.
Paul Roeland
Integrator, open source activist and non-profit tech person. Currently on the Board.
Paul Roeland
Integrator, open source activist and non-profit tech person. Currently on the Board.
Plone 2020
The future of Plone - a community-generated roadmap from the 2014 Plone Conference
Plone Hotfix Descriptions
Descriptions of the individual hotfixes and the vulnerabilities they address.
Report a Security Issue
If you think you found a security related problem, please report it responsibly.
Roadmap
With over 20 years of past, here we talk about the future of Plone.
Security Hotfixes
Always check if there may have been a hotfix released after the version of Plone that you are using to keep your site as secure as possible.
Security track record
Measuring or quantifying security risks in software is hard — security is a process, not a product, and thus requires constant vigilance and good coding practices combined with security reviews. Yet we have never received a report of a serious vulnerability in Plone being exploited in the wild.
Security update policy
Plone's security team releases periodic updates containing fixes and security improvements typically found through code audits. Serious vulnerabilities, especially those reported by external researchers, are fixed as soon as possible.