Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
|
|
|
- Oswin Ferguson
- 9 years ago
- Views:
Transcription
1 Remediation Statistics: What Does Fixing Application Vulnerabilities Cost? Dan Cornell Denim Group, Ltd. Session ID: ASEC-302 Session Classification: Intermediate
2 Agenda An Innocent Question Finding a Structure for Remediation Projects Methodology Remediation Data Analysis and Recommendations Questions 2
3 Fixing a Cross-Site Scripting (XSS) Vulnerability How long does it take? A) 9.6 minutes B) 16.2 minutes C) 84 minutes D) It doesn t matter E) All of the above 3
4 Fixing a Cross-Site Scripting (XSS) Vulnerability How long does it take? A) 9.6 minutes Average fix time for stored XSS (no load) B) 16.2 minutes Average fix time for reflected XSS (no load) C) 84 minutes Average fix time for stored and reflected (loaded) D) It doesn t matter E) All of the above 4
5 Fixing a Cross-Site Scripting (XSS) Vulnerability How long does it take? A) 9.6 minutes Average fix time for stored XSS (no load) B) 16.2 minutes Average fix time for reflected XSS (no load) C) 84 minutes Average fix time for stored and reflected (loaded) D) It doesn t matter E) All of the above 5
6 Remediation Worst Practices When the security team: Demands a development team devote time and budget to remediation Provides them with no direction or support Has the development team attempt to make fixes on their own Complains when things don t work out 6
7 Remediation Worst Practices Result: No new features and half- or non-fixed vulnerabilities Good luck getting your next remediation project approved 7
8 Finding a Structure for Remediation Projects Desired outcome: predictable and effective remediation projects Predictable: know how long they will take and how much they will cost Effective: targeted vulnerabilities actually get fixed A community of stakeholders Security Development IT Audit / Compliance 8
9 Remediation Projects Inception Planning Calculate Risk Agree on Fix and Confirmation Methods Determine Level of Effort Schedule Execution Set up Development Environment Fix Vulnerabilities Confirm Fixes and Perform Functional Testing Deploy 9
10 Remediation: How To Guide Describes methodology for software security remediation projects Includes tips and best practices Free online denimgroup.com/howtoguide_download_register.html 10
11 That s Great But How long will it actually take me to fix my vulnerabilities? Software security remediation projects are software development projects So estimate them as such Best practices: Bottom-up estimation Cluster vulnerabilities where possible It would be nice to have some data to use as a starting point 11
12 Data! Took data from 15 remediated applications Two types of analysis: Vulnerability-level (4 applications) Project-level (13 applications) Data from Inception and Planning phases was too messy Data from Execution phase was useable 12
13 The Good (Why This Data Might Be Useful) Some data is better than no data As long as you understand potential areas of bias Read How to Measure Anything by Douglas W. Hubbard Had relatively large sample size for some vulnerability types 13
14 The Bad (Some Potential Sources of Bias) Relatively small sample size Based on a single project type Outsourced software security remediation projects Data required cleanup and normalization Vulnerability data centered around technical vulnerabilities Most identified by automated static analysis 14
15 Vulnerability-Specific Data (20+ Sample Count) Vulnerability Type Sample Count Average Fix (minutes) Dead Code (unused methods) Poor logging: system output stream Poor Error Handling: Empty catch block Lack of Authorization check Unsafe threading ASP.NET non serializable object in session XSS (stored) Null Dereference Missing Null Check XSS (reflected) Redundant null check SQL injection
16 Some Thoughts and Notes Apparently deleting code and changing logging methods are easy Cross-Site Scripting Vulnerability count tracks with data from WhiteHat, Veracode, other sources Harder to fix reflected XSS than stored XSS Lack of Authorization Check Fix consisted of copy/pasting file include into a number of files SQL Injection Surprisingly high Reason: fixes were for more complicated SQL injection vulnerabilities 16
17 So If I Have 6 Stored XSS Vulnerabilities my remediation project should take about an hour, right? But wait! 17
18 Remediation Is Not Just About Coding Fixes This data is from one of four steps in one of three phases Fix Vulnerabilities step in the Execution phase What about Inception and Planning? No great data available yet What about the rest of Execution? Set up Development Environment Fix Vulnerabilities Confirm Fixes and Perform Functional Testing Deploy Overhead 18
19 Where Is Time Being Spent? 70% 60% 59% Indicates the weighted average versus the average of individual projects 50% 40% 37% 44% 42% 30% 20% 10% 0% 31% 17% 16% 0% Setup Development Environment 28% 29% 24% 24% 20% 15% 15% 9% 3% 2% 0% Fix Vulnerabilities Confirm Fixes / QA Deploy 0% Overhead 19
20 Some Thoughts and Notes Setup Development Environment Best case: existing development environment or VM Worst case: Safari expedition to recreate environment setup because organization no longer had this knowledge Instructions on setting up a development environment were a deliverable Fix Vulnerabilities This is what people focus on but there is wide variation 20
21 Some Thoughts and Notes (continued) Confirm Fixes / QA Sometimes this took more time than the actual fixes Best case: Existing set of automated functional / regression tests Deploy Best case: use an existing planned release Overhead Surprisingly high in some cases 21
22 Using the Data I thought you said to estimate bottom-up? Yes. Do that Use the vulnerability data as a guide for estimation Use the project composition data for validation Use the lessons of the data to try and minimize required investment 22
23 What Can I Do To Minimize Remediation Costs? Avoid introducing vulnerabilities into your software (You are all welcome for this piece of sage advice) 23
24 What Can I Do To Minimize Remediation Costs? Have ready access to development environments for the developers doing the remediation Automated functional / regression testing helps speed security fixes Use planned deployments when possible 24
25 Which Vulnerabilities Get Fixed and When? Use your data-backed, bottom-up WBS for risk management and planning Serious vulnerabilities that are easy to fix? Consider an out-of-cycle release Otherwise leverage planned releases 25
26 The Outlier We remediated one vulnerability not included in the study that was more expensive to fix than all vulnerabilities in the study Authentication issue in a connected system Requirements and architecture vulnerability Automated scanners static or dynamic: powerless to find it Should have / would have been caught by even a basic threat modeling or abuse case session 26
27 So Where Does This Leave Us Good: We have a framework We have some data Less good: The data comes with a number of caveats Given a framework and some data you should be: Better able to execute successful projects Better able to estimate projects Better able to minimize project costs 27
28 Next Steps For Me Release a more in-depth report Include more data in the analysis Perform deeper analysis Impact of size of project (hours) Impact of number of vulnerabilities remediated Impact of platform And so on Include data on logical vulnerabilities 28
29 Apply Review your existing vulnerability data Create a back of the envelope plan to address open vulnerabilities Run different scenarios: All critical and high All public-facing apps and so on Talk to developers How do they set up development environments? When do they do planned releases? Fix some vulnerabilities! Application-level vulnerabilities persist for a long time 29
30 Remediation Resource Center Resources for remediating software security vulnerabilities Videos How-to Guide Blog posts denimgroup.com/remediation 30
31 Questions? Dan Cornell blog.denimgroup.com (210)
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams October 13, 2012 OWASP Boston Application Security Conference Agenda Introduction / Background Vulnerabilities
Vulnerability Management in an Application Security World. AppSec DC November 12 th, 2009. The OWASP Foundation http://www.owasp.
Vulnerability Management in an Application Security World AppSec DC November 12 th, 2009 Dan Cornell Global Membership Committee Denim Group [email protected] (210) 572-4400 Twitter: @danielcornell The
Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006
Turning the Battleship: How to Build Secure Software in Large Organizations Dan Cornell May 11 th, 2006 Overview Background and key questions Quick review of web application security The web application
Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006
Introduction to Web Application Security Microsoft CSO Roundtable Houston, TX September 13 th, 2006 Overview Background What is Application Security and Why Is It Important? Examples Where Do We Go From
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together. Dan Cornell. CTO, Denim Group@danielcornell
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together Dan Cornell CTO, Denim Group@danielcornell This presentation contains information about DHS-funded research: Topic Number:
Using Sprajax to Test AJAX. OWASP AppSec Seattle Oct 2006. The OWASP Foundation http://www.owasp.org/
Using Sprajax to Test AJAX Security OWASP AppSec Seattle Oct 2006 Dan Cornell, OWASP San Antonio Leader Principal, Denim Group, Ltd. [email protected] (210) 572-4400 Copyright 2006 - The OWASP Foundation
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Managing Your Application Security Program with the ThreadFix Ecosystem!! Dan Cornell! @danielcornell
Managing Your Application Security Program with the ThreadFix Ecosystem!! Dan Cornell! @danielcornell This presentation contains information about DHS-funded research: Topic Number: H-SB013.1-002 - Hybrid
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
How to Build a Trusted Application. John Dickson, CISSP
How to Build a Trusted Application John Dickson, CISSP Overview What is Application Security? Examples of Potential Vulnerabilities Strategies to Build Secure Apps Questions and Answers Denim Group, Ltd.
Application Portfolio Risk Ranking Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking Banishing FUD With Structure and Numbers Dan Cornell OWASP AppSec DC 2010 November 11 th, 2010 Overview The Problem Information Gathering Application Scoring Risk Rank
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group
Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group Overview What is Application Security? Examples of Potential Vulnerabilities Potential Strategies
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
How-to-Guide for Software Security Vulnerability Remediation. by Dan Cornell
for Software Security Vulnerability Remediation by Dan Cornell Executive Summary The security industry often pays a tremendous amount of attention to finding security vulnerabilities. This is done via
Comparing Application Security Tools
Comparing Application Security Tools Defcon 15-8/3/2007 Eddie Lee Fortify Software Agenda Intro to experiment Methodology to reproduce experiment on your own Results from my experiment Conclusions Introduction
Security Testing & Load Testing for Online Document Management system
1 Security Testing & Load Testing for Online Document Management system Abstract The client is a leading provider of online technical documentation solutions in UK, they wanted to protect their documents
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
DEVELOPING SECURE SOFTWARE
DEVELOPING SECURE SOFTWARE A FOUNDATION FOR CLOUD AND IOT SECURITY Eric Baize @ericbaize Senior Director, Product Security Office EMC Corporation Chairman of SAFECode CSA EMEA Congress November 2015 1
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Enterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013
We protect you applications! No, you don t Digicomp Hacking Day 2013 May 16 th 2013 Sven Vetsch Partner & CTO at Redguard AG www.redguard.ch Specialized in Application Security (Web, Web-Services, Mobile,
Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.
Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
ALM/Quality Center. Software
HP ALM/Quality Center Software Datasheet Page 1 of 8 HP Application Lifecycle Management software In today s rapidly changing business world, business agility depends on IT agility. And predictable, high
Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities
Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities
WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program
WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers
White Paper Guide to PCI Application Security Compliance for Merchants and Service Providers Contents Overview... 3 I. The PCI DSS Requirements... 3 II. Compliance and Validation Requirements... 4 III.
Secure Development Lifecycle. Eoin Keary & Jim Manico
Secure Development Lifecycle Jim Manico @manicode OWASP Volunteer Global OWASP Board Member OWASP Cheat-Sheet Series Manager VP of Security Architecture, WhiteHat Security 16 years of web-based, database-driven
SECURITY AND REGULATORY COMPLIANCE OVERVIEW
Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW BetterCloud for Office 365 Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
next generation privilege identity management
next generation privilege identity management Nowadays enterprise IT teams are focused on adopting and supporting newer devices, applications and platforms to address business needs and keep up pace with
Integrigy Corporate Overview
mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation
An Introduction to Application Security in J2EE Environments
An Introduction to Application Security in J2EE Environments Dan Cornell Denim Group, Ltd. www.denimgroup.com Overview Background What is Application Security and Why is It Important? Specific Reference
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier
Enterprise Application Security Program
Enterprise Application Security Program GE s approach to solving the root cause and establishing a Center of Excellence Darren Challey GE Application Security Leader Agenda Why is AppSec important? Why
How To Understand And Understand The Security Of A Web Browser (For Web Users)
Security vulnerabilities: should they be early detected? - [email protected] Alessandro Garcia [email protected] OPUS Research Group Agenda 1. Background; 2.Motivation; 3.Research Questions;
Put a Firewall in Your JVM Securing Java Applications!
Put a Firewall in Your JVM Securing Java Applications! Prateep Bandharangshi" Waratek Director of Client Security Solutions" @prateep" Hussein Badakhchani" Deutsche Bank Ag London Vice President" @husseinb"
TOOL EVALUATION REPORT: FORTIFY
TOOL EVALUATION REPORT: FORTIFY Derek D Souza, Yoon Phil Kim, Tim Kral, Tejas Ranade, Somesh Sasalatti ABOUT THE TOOL Background The tool that we have evaluated is the Fortify Source Code Analyzer (Fortify
Security in the Sauce Labs Cloud
SAUCE LABS REPORT Security in the Sauce Labs Cloud Practices and protocols used in Sauce s infrastructure and Sauce Connect Overview It s impossible to deny that in this day and age internet security should
Agile and Secure: OWASP AppSec Seattle Oct 2006. The OWASP Foundation http://www.owasp.org/
Agile and Secure: Can We Be Both? OWASP AppSec Seattle Oct 2006 Dan Cornell, OWASP San Antonio Leader Principal, Denim Group Ltd. [email protected] (210) 572-4400 Copyright 2006 - The OWASP Foundation
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL
APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL Charles Henderson Trustwave SpiderLabs Session ID: Session Classification: SPO2-W25 Intermediate AGENDA One size rarely fits all Sizing up an application
10174 - SharePoint 2010
Configuring and Managing Microsoft SharePoint 2010 Introduction The course teaches students how to install, configure and administer SharePoint, and also manage and monitor sites and users by using SharePoint
Nikolay Zaynelov Annual LUG-БГ Meeting 2015. nikolay.zaynelov.com [email protected]
Nikolay Zaynelov Annual LUG-БГ Meeting 2015 nikolay.zaynelov.com [email protected] Introduction What is WordPress WordPress is a free and open source content management system (CMS). It is the most
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Main Question 1: How and where do you or your family use the Internet - whether on a computer or a cell phone? Follow up questions for INTERNET USERS
TABLE 1: Current Internet use Main Question 1: How and where do you or your family use the Internet - whether on a computer or a cell phone? Follow up questions for INTERNET USERS 1. What do you use to
NE T GENERATION CLOUD SECURITY PLATFORM
Qualys Cloud Platform The Qualys Cloud Platform and integrated suite of solutions enable organizations to simplify the process and reduce the cost of identifying and securing their IT assets, while ensuring
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
Online Vulnerability Scanner Quick Start Guide
Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.
Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007
Agile and Secure Can We Be Both? Chicago OWASP June 20 th, 2007 The Agile Practitioner s Dilemma Agile Forces: Be more responsive to business concerns Increase the frequency of stable releases Decrease
WebGoat for testing your Application Security tools
WebGoat for testing your Application Security tools NAISG-DFW February 28 th, 2012 Michael A Ortega, CISSP CEH CISM GCFA Sr Application Security Professional IBM Security Systems 312.523.1538 [email protected]
The AppSec How-To: Achieving Security in DevOps
The AppSec How-To: Achieving Security in DevOps How do you integrate security within a Continuous Deployment (CD) environment - where every 5 minutes a feature, an enhancement, or a bug fix needs to be
GUI Test Automation How-To Tips
www. routinebot.com AKS-Labs - Page 2 - It s often said that First Impression is the last impression and software applications are no exception to that rule. There is little doubt that the user interface
Performing a Web Application Security Assessment
IBM Software Group Performing a Web Application Security Assessment 2007 IBM Corporation Coordinate the Time of the Audit Set up a time window with the application owner Inform your security team Inform
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
BSA Best Practices Webinars Role Based Access Control Sean Berry Customer Engineering
BSA Best Practices Webinars Role Based Access Control Sean Berry Customer Engineering Agenda Overview RBAC Objects Implementation Use Cases - Basic - Advanced - Multi Tenancy GUI Tour Copyright 6/14/2013
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
NSFOCUS Web Vulnerability Scanning System
NSFOCUS Web Vulnerability Scanning System Overview Most Web application systems are tailor-made and delivered in source codes by Customer Benefits Accurate Analysis on Website Vulnerabilities Fast scan
Web attacks and security: SQL injection and cross-site scripting (XSS)
Web attacks and security: SQL injection and cross-site scripting (XSS) License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike
Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks
EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector
How to set up SQL Source Control. The short guide for evaluators
How to set up SQL Source Control The short guide for evaluators Content Introduction Team Foundation Server & Subversion setup Git setup Setup without a source control system Making your first commit Committing
Coverity Scan. Big Data Spotlight
Coverity Scan Big Data Spotlight Coverity Scan Service The Coverity Scan service began as the largest public-private sector research project in the world focused on open source software quality and security.
THE WEB HACKING INCIDENTS DATABASE 2009
THE WEB HACKING INCIDENTS DATABASE 2009 BI-ANNUAL REPORT AUGUST 2009 Breach Security, Inc. Corporate Headquarters 2141 Palomar Airport Road, #200 Carlsbad, CA 92011 USA tel: (760) 268-1924 toll-free: (866)
Web Security CS25010. 20th November 2012. 2012, Jonathan Francis Roscoe, [email protected] Department of Computer Science, Aberystwyth University
Web Security CS25010 20th November 2012 Session Errors Some people are having errors creating sessions: Warning: session_start() [function.session-start]: open(/var/php_sessions/sess_d7hag76hgsfh2bjuhmdamb974,
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Agile QA Process. Anand Bagmar [email protected] [email protected] http://www.essenceoftesting.blogspot.com. Version 1.
Agile QA Process Anand Bagmar [email protected] [email protected] http://www.essenceoftesting.blogspot.com Version 1.1 Agile QA Process 1 / 12 1. Objective QA is NOT the gatekeeper of the quality
Web Application Security Roadmap
Web Application Security Roadmap Joe White [email protected] Cyberlocksmith April 2008 Version 0.9 Background Web application security is still very much in it s infancy. Traditional operations teams
