Streamlining Application Vulnerability Management: Communication Between Development and Security Teams
|
|
|
- Vernon Sherman
- 10 years ago
- Views:
Transcription
1 Streamlining Application Vulnerability Management: Communication Between Development and Security Teams October 13, 2012 OWASP Boston Application Security Conference
2 Agenda Introduction / Background Vulnerabilities Infrastructure (Network) vs. Application (Software) Roles Security vs. Development Vulnerability Workflow ThreadFix: An Open Source Tool Questions 1
3 Introduction / Background Me (Brian Mather) Product & Consulting Manager at Denim Group 5 years experience managing app development & security assessment projects 13 years in information technology/security industry Managing partner at IT services company for 10 years Denim Group Headquarters in San Antonio, TX Professional services firm that offers a unique service blend Builds & secures enterprise applications Application Security Developer Education (ILT & elearning) Customer base spans Fortune 500 Market Focus: Financial Services, Banking, Insurance, Healthcare, and Defense Contributes to industry best practices through the Open Web Application Security Project (OWASP) 2
4 Vulnerabilities: Defined Infrastructure (Network): any flaw or weakness in network defense that could be exploited to gain unauthorized access to, damage, or otherwise affect a network Application (Software): a weakness in an application, either a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application Problem isn t finding vulnerabilities, it s fixing them Identifying application-level vulnerabilities via scanning tools, penetration tests and code reviews is only the first step in actually addressing the underlying risk. 3
5 Vulnerability Fun Facts: Average number of serious vulnerabilities found per website per year is 79 ** Serious Vulnerabilities were fixed in ~38 days ** Percentage of serious vulnerabilities fixed annually is only 63% ** Average number of days a website is exposed, at least one serious vulnerability ~231 days WhiteHat Statistics Report (Summer 2012): 4
6 Vulnerability Remediation Data Vulnerability Type Sample Count Average Fix (minutes) Dead Code (unused methods) Poor logging: system output stream Poor Error Handling: Empty catch block Lack of Authorization check Unsafe threading ASP.NET non-serializable object in session XSS (stored) Null Dereference Missing Null Check XSS (reflected) Redundant null check SQL injection
7 Security Team: Development Team: Identify / Communicate Risk Penetration Testing Application Scanning Protecting Assets Mitigating Risk VS. Building Software Feature Development Application Performance Bug Fixes Deployments Typically, teams that find vulnerabilities (Security) don t know how to fix / remediate Typically, teams that fix vulnerabilities (Development) don t understand the potential business risk / impact 6
8 Vulnerability Workflow: Typical Security Workflow Runs a scan produce PDF print/ to development = BAD Runs 2 scans produce 2 PDFs print/ to development = WORSE Runs 2 scans merging vulnerabilities into excel print/ to development = HORRIBLE Let the negotiations begin Typical Development Workflow Developers informed of vulnerabilities with little / no context provided (no steps to reproduce) Ticket created in defect tracker (maybe?) assign to developer Developer fixes bug ticket updated in defect tracker notify security team of fix (maybe?) Can we get back to our development schedule yet? 7
9 Vulnerability Workflow: Managing Application Vulnerabilities Actual business risk is challenging to determine More challenging than infrastructure vulnerabilities (patching / configuration changes) Changes to custom code and application-specific business logic Requires coordinated effort between security & development teams Inefficient process: Difficulty making sense of and prioritizing data in (overlapping) scanning reports Different teams use different scanning tools (tools use different terms and severities) Lack of centralized management/view Friction/Negative interaction between security & development teams Remediation becomes an overwhelming project Security managers need to request time from developers (already-cramped dev/release schedules) Development doesn t have or want to give up time to fix vulnerabilities Hesitation scanning new apps, fear of finding new vulnerabilities when queue isn t clearing fast enough Creating trending reports is impractical Lack of visibility across app portfolios Without consistent language and consolidated data, knowing whether your organization is actually reducing the number of vulnerabilities is impossible 8
10 Two teams with different focuses, however both teams play a critical role in the remediation of application vulnerabilities, and need to communicate. What can be done to solve this problem? 9
11 The ThreadFix Approach An open source vulnerability management and aggregation platform that allows software security teams to reduce the time it takes to fix software vulnerabilities Freely available under the Mozilla Public License (MPL) Download available at: 10
12 ThreadFix: Accelerate Software Remediation Application Portfolio Management One central, canonical location to keep track of all of the organization s applications Vulnerability Import Supports dynamic and static results from a variety of sources (both commercial and freely available scanning tools, manual testing, and SaaS testing providers) De-duplicate scan results (1 vulnerability found by 4 tools vs. 4 vulns) Defect Tracking Integration Allows application security teams to slice/dice, bundle, and ship vulnerabilities over to development staff using tools they are familiar with and currently using Real-Time Protection Generation Application-specific rules based on identified vulnerabilities & associated attack data Virtual patching helps protect organization and eliminate false positives blocks Maturity Evaluation Report on software security program progress Benchmark security practice improvement against industry standards 11
13 Supported Tools: Dynamic Scanners Burp Suite HP WebInspect Mavituna Security Netsparker Tenable Nessus Acunetix OWASP Zed Attack Proxy Arachni Skipfish w3af Static Scanners HP Fortify SCA Microsoft CAT.NET FindBugs Ounce IBM Security AppScan Source Brakeman SaaS Testing Platforms WhiteHat Veracode QualysGuard WAS 2.0 IDS/IPS and WAF Snort mod_security Imperva F5 DenyAll Defect Trackers Mozilla Bugzilla Atlassian JIRA 12
14 Dashboard List of development teams in the organization, including number of apps for each team and a summary of the security status of those apps. 13
15 ThreadFix Consolidation Vulnerability scans are aggregated providing a centralized view of the security status of an application. 14
16 Agreeing On The Workload Bundling multiple instances of the same vulnerability into a single defect ThreadFix integrates with Mozilla Bugzilla and Atlassian JIRA 15
17 The Defect Tracking System Security analyst exports vulnerabilities with Critical Severity to the Defect Tracking System (Bugzilla in this example). The development team then uses Bugzilla to keep track of outstanding bugs and management tasks still to be done. 16
18 Vulnerabilities Now Become Defects Vulnerabilities are packaged in a manner that makes sense to the development team s workflow. These vulnerabilities, now recognized as defects, are transferred to Bugzilla, the platform the development team is used to using. 17
19 Defect Categories & Status inside ThreadFix Security analyst can see all open vulnerabilities, including defects they are linked to. Currently view: none of the bugs have been resolved by the development team. First Defect Second Defect Third Defect 18
20 A Defect (Security Vulnerability) Is Fixed (Or is it?) The developers review the bug containing the Critical vulnerabilities. They work with representatives from security to resolve the issue and then mark the bug as fixed in Bugzilla. 19
21 Bugzilla Updates Are Synchronized With ThreadFix When a ThreadFix update is performed, Bugzilla s developer notes regarding bug status are synchronized with ThreadFix The security team then performs additional scans to confirm that the bugs have, indeed, been fixed. 20
22 Trending Reports Help Improve Quality By repeating this process over time, the security teams can start to collect trending data about vulnerabilities as well as statistics of how long it is taking to resolve security issues. 21
23 Summary Communication between security & development teams is inefficient Current Vulnerability Management process ThreadFix facilitates communication between security & development Integrating with commercial and open source scanners & defect trackers Reducing the time required to fix vulnerable applications. Dramatically simplifying remediation effort required Providing centralized visibility into current security state of applications Giving security ability to benchmark progress & track progress over time No licensing fees Freely available under the Mozilla Public License (MPL) via Google Code Open community support 22
24 Where to Get ThreadFix For more information, go to Directed to a Google Code Repository and download the zip file. Click on the Threadfix.bat icon in Windows, or, in Linux, navigate to the folder and execute bash threadfix.sh. Go on the wiki and open the Getting Started file for more step by step directions. 23
25 Contact Information Brian Mather Product & Consulting Manager (210) blog.denimgroup.com 24
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together. Dan Cornell. CTO, Denim Group@danielcornell
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together Dan Cornell CTO, Denim Group@danielcornell This presentation contains information about DHS-funded research: Topic Number:
Managing Your Application Security Program with the ThreadFix Ecosystem!! Dan Cornell! @danielcornell
Managing Your Application Security Program with the ThreadFix Ecosystem!! Dan Cornell! @danielcornell This presentation contains information about DHS-funded research: Topic Number: H-SB013.1-002 - Hybrid
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost? Dan Cornell Denim Group, Ltd. Session ID: ASEC-302 Session Classification: Intermediate Agenda An Innocent Question Finding a
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
Vulnerability Management in an Application Security World. AppSec DC November 12 th, 2009. The OWASP Foundation http://www.owasp.
Vulnerability Management in an Application Security World AppSec DC November 12 th, 2009 Dan Cornell Global Membership Committee Denim Group [email protected] (210) 572-4400 Twitter: @danielcornell The
A Network Administrator s Guide to Web App Security
A Network Administrator s Guide to Web App Security Speaker: Orion Cassetto, Product Marketing Manager, Incapsula Moderator: Rich Nass, OpenSystems Media Agenda Housekeeping Presentation Questions and
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Application Security Testing How to find software vulnerabilities before you ship or procure code
Application Security Testing How to find software vulnerabilities before you ship or procure code Anita D Amico, Ph.D. Hassan Radwan 1 Overview Why Care About Application Security? Quality vs Security
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis
Integrating Security into the Application Development Process Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis Agenda Seek First to Understand Source Code Security AppSec and SQA Analyzing
Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security
Secrets of Vulnerability Scanning: Nessus, Nmap and More Ron Bowes - Researcher, Tenable Network Security 1 About me Ron Bowes (@iagox86) My affiliations (note: I m here to educate, not sell) 2 SkullSpace
From Rivals to BFF: WAF & VA Unite OWASP 07.23.2009. The OWASP Foundation http://www.owasp.org
From Rivals to BFF: WAF & VA Unite 07.23.2009 Brian Contos, Chief Security Strategist Imperva Inc. [email protected] +1 (650) 832.6054 Copyright The Foundation Permission is granted to copy, distribute
Realize That Big Security Data Is Not Big Security Nor Big Intelligence
G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
Comparing the Effectiveness of Penetration Testing and Static Code Analysis
Comparing the Effectiveness of Penetration Testing and Static Code Analysis Detection of SQL Injection Vulnerabilities in Web Services PRDC 2009 Nuno Antunes, [email protected], [email protected] University
How to Secure Your SharePoint Deployment
WHITE PAPER How to Secure Your SharePoint Deployment Some of the sites in your enterprise probably contain content that should not be available to all users [some] information should be accessible only
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office
CSUSB, Information Security & Emerging Technologies Office Last Revised: 03/17/2015 Draft REVISION CONTROL Document Title: Author: File Reference: CSUSB Web Application Security Standard Javier Torner
Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006
Turning the Battleship: How to Build Secure Software in Large Organizations Dan Cornell May 11 th, 2006 Overview Background and key questions Quick review of web application security The web application
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
VULNERABILITY MANAGEMENT
Vulnerability Management (VM) software differ in the richness of reporting, and the capabilities for application and security configuration assessment. Companies must consider how a VM technology will
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Securing SharePoint 101. Rob Rachwald Imperva
Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
Production Security and the SDLC. Mark Kraynak Sr. Dir. Strategic Marketing Imperva [email protected]
Production Security and the SDLC Mark Kraynak Sr. Dir. Strategic Marketing Imperva [email protected] Building Security Into the Development Process Production Test existing deployed apps Eliminate security
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
How To Protect Your Data From Attack
Integrating Vulnerability Scanning into the SDLC Eric Johnson JavaOne Conference 10/26/2015 1 Eric Johnson (@emjohn20) Senior Security Consultant Certified SANS Instructor Certifications CISSP, GWAPT,
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Integrigy Corporate Overview
mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Code Dx: Visual analytics for triage of source code vulnerabilities
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Code Dx: Visual analytics for triage of source code vulnerabilities Secure Decisions, a division of Applied Visions, Inc. Anita D Amico Ken Prole September
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015
QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Bust a cap in a web app with OWASP ZAP
The OWASP Foundation http://www.owasp.org Bust a cap in a web app with OWASP ZAP Adrien de Beaupré GSEC, GCIH, GPEN, GWAPT, GCIA, GXPN ZAP Evangelist Intru-Shun.ca Inc. SANS Instructor, Penetration Tester,
Web Application Security Roadmap
Web Application Security Roadmap Joe White [email protected] Cyberlocksmith April 2008 Version 0.9 Background Web application security is still very much in it s infancy. Traditional operations teams
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA Paul R. Lazarr, CISSP, CISA, CIPP, CRISK Sr. Managing Consultant, IBM Cybersecurity and Biometrics January 21, 2016 PERSONAL BACKGROUND
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)
Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Perimeter Service... 3 Subscription and Activation... 3 Multi Scanner Support...
Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006
Introduction to Web Application Security Microsoft CSO Roundtable Houston, TX September 13 th, 2006 Overview Background What is Application Security and Why Is It Important? Examples Where Do We Go From
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Ciklum Solutions Quality Assurance Solutions Unit Security QA Services reference
Ciklum Solutions Quality Assurance Solutions Unit Security QA Services reference 2002-2015 Ciklum. All rights reserved Kyiv, 2015 Client: Platform: Technology: Tools: DanDomain Delivery: Website: Security
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
HackMiami Web Application Scanner 2013 PwnOff
HackMiami Web Application Scanner 2013 PwnOff An Analysis of Automated Web Application Scanning Suites James Ball, Alexander Heid, Rod Soto http://www.hackmiami.org Overview Web application scanning suites
Enterprise Application Security Program
Enterprise Application Security Program GE s approach to solving the root cause and establishing a Center of Excellence Darren Challey GE Application Security Leader Agenda Why is AppSec important? Why
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
TOOL EVALUATION REPORT: FORTIFY
TOOL EVALUATION REPORT: FORTIFY Derek D Souza, Yoon Phil Kim, Tim Kral, Tejas Ranade, Somesh Sasalatti ABOUT THE TOOL Background The tool that we have evaluated is the Fortify Source Code Analyzer (Fortify
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Best Practices for Threat & Vulnerability Management. Don t let vulnerabilities monopolize your organization.
Best Practices for Threat & Vulnerability Management Don t let vulnerabilities monopolize your organization. Table of Contents 1. Are You in the Lead? 2. A Winning Vulnerability Management Program 3. Vulnerability
Breaking down silos of protection: An integrated approach to managing application security
IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Vulnerability Threat Management
Vulnerability Threat Management Project Proposal Form Project Title Vulnerability Threat Management Agency/Entity Security Architecture Work Group Form Version: 20070910 Notes about this form: 1. USE.
METHODS TO TEST WEB APPLICATION SCANNERS
METHODS TO TEST WEB APPLICATION SCANNERS Fernando Román Muñoz, Luis Javier García Villalba Group of Analysis, Security and Systems (GASS) Department of Software Engineering and Artificial Intelligence
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Expert Services Group (Security Testing) Nilesh Dasharathi Sadaf Kazi Aztecsoft Limited
Practical Aspects of Web Application Penetration Testing & Vulnerability Analysis Expert Services Group (Security Testing) Nilesh Dasharathi Sadaf Kazi Aztecsoft Limited Presentation Path Motivation Penetration
White Paper. Managing Risk to Sensitive Data with SecureSphere
Managing Risk to Sensitive Data with SecureSphere White Paper Sensitive information is typically scattered across heterogeneous systems throughout various physical locations around the globe. The rate
Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares
Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)
Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning
IBM Rational AppScan: enhancing Web application security and regulatory compliance.
Strategic protection for Web applications To support your business objectives IBM Rational AppScan: enhancing Web application security and regulatory compliance. Are untested Web applications putting your
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Integrating Web Application Security into the IT Curriculum
Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University Topics 1. 2. 3. 4. Why should we teach web application security? What material do we need to cover?
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Starting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden
Starting your Software Security Assurance Program May 21, 2015 ITARC, Stockholm, Sweden Presenter Max Poliashenko Chief Enterprise Architect Wolters Kluwer, Tax & Accounting Max leads the Enterprise Architecture
CyberSecurity Innovation Assessing your Organizations Vulnerability to a Cyber breach
CyberSecurity Innovation Assessing your Organizations Vulnerability to a Cyber breach Steve Mullan Co Founder of Cognition Secure Ltd https://cognitionsecure.com Thank You 7/12/2015 Copyright Cognition
! Resident of Kauai, Hawaii
SECURE SDLC Jim Manico @manicode! OWASP Volunteer! Global OWASP Board Member! Manager of several OWASP secure coding projects! Security Instructor, Author! 17 years of web-based, databasedriven software
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
Closing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
