Open Source Security Study How Are Open Source Development Communities Embracing Security Best Practices?
|
|
|
- Berenice Cannon
- 10 years ago
- Views:
Transcription
1 Open Source Security Study How Are Open Source Development Communities Embracing Security Best Practices? Fortify s Security Research Group and Larry Suto July 2008 Open Source Security Study 1
2 Open Source Security Study How Are Open Source Development Communities Embracing Security Best Practices? Table of Contents 3 Introduction 4 Study Methodology 5 Key Findings 9 Conclusions 10 About Larry Suto 11 About Fortify 11 References Executive Summary Open source now permeates more than 50 percent of enterprises, and its use is growing rapidly. 1 This trend underlies an assumption held by many IT and business leaders that open source is enterprise class in terms of functionality and scalability. But is it secure? How much business risk is introduced with open source? As a provider of software security assurance tools, Fortify has often been drawn into the center of the debate over this question. The use of Fortify tools to identify vulnerabilities in open source software has demonstrated that risk exists. Fortify has made attempts to reduce the risk by sharing vulnerability reports with the open source community. Yet the risk remains. In an effort to ascertain why open source development seems resistant to information on security, Fortify surveyed the open source community. (See Figure 1.) Our research revealed that open source projects lack the three essential elements of security: people, process, and technology, thereby introducing significant application security risk. The study showed that many open source projects fail to: 1. Provide Access to Security Expertise: Few open source projects provide documentation that covers the security implications and secure deployment of the software they develop, a dedicated alias for users to report security vulnerabilities, or easy access to internal security experts to discuss security issues. Open Source Security Study 2
3 The European Commission s Competition Commissioner, Neelie Kroes, recently stated that open standards, and open source, are preferable to traditional closed source software Adopt a Secure Development Process: Not only did every project that we scanned contain significant security issues, but in all but one, the total number of security issues remained constant or increased between successive releases. This demonstrates that the projects have not adopted a successful secure development process. 3. Leverage Technology to Uncover Security Vulnerabilities: Well-known security vulnerabilities, such as Cross-Site Scripting (XSS) and SQL Injection, were among the most common and serious problems identified, which is consistent with OWASP findings. 2 These classes of vulnerabilities can be identified by enrolling in the free Fortify Java Open Review (JOR) project or with open source tools, such as FindBugs. 3 This indicates that the projects do not make use of technology to identify and resolve security issues. 4 These findings provide a call-to-action for organizations that rely on open source software. Specifically, Fortify recommends: Government and commercial organizations that leverage open source should use open source applications with great caution. Risk analysis and code review should be performed on any open source code running in business-critical applications, and these processes should be repeated before new versions of open source components are approved for use. Open source projects should adopt robust security practices from their commercial counterparts. Open source development can benefit from private industry practices notably those created by financial services organizations and larger independent software vendors (ISVs). Open source communities can then advertise and substantiate effective security practices that blend process and technology. Introduction Fortify recently conducted a study designed to better understand the overall security of popular open source projects and the role of security in their development processes. This work was motivated by the: Rapid growth in the adoption of open source among enterprises An April 2008 survey by CIO.com showed that more than half of the respondents (53 percent) are using open source applications in their organization today, and an additional 10 percent plan to do so in the next year. For nearly half (44 percent), open source applications are considered equal to closed-source solutions during the acquisition process. 5 The European Commission s Competition Commissioner, Neelie Kroes, recently stated that open standards, and open source, are preferable to traditional closed source software. 6 Open Source Security Study 3
4 Rising number of attacks targeted at the application layer It is no longer acceptable for businesses to ignore the risk that open source software can introduce, nor is it adequate for open source projects to disregard the role security plays in their development process. Today s hackers are going after applications. Gartner has reported that 75 percent of hacks take place at the application layer. 7 The US Air Force, for example, has seen application layer attacks increase from 2 percent in 2004 to 33 percent in Fortify software has worked with organizations around the world that are committed to business software assurance as demonstrated through improved software development processes. A few years ago, this was limited to the elite, which typically included members of the global financial services and military communities. Today, we are witnessing a surge in adoption of secure development practices across organizations, both large and small, in a wide range of industries. This widespread adoption of security processes has helped to raise the bar for security. It is no longer acceptable for businesses to ignore the risk that open source software can introduce, nor is it adequate for open source projects to disregard the role security plays in their development process. Study Methodology The projects included in this study were selected because they are implemented in Java (the most common programming language for enterprise development 9 ), represent a wide range of application functionality, and are used extensively to build and deploy enterprise applications. Freeware projects that are not open source were excluded. Table I lists the projects included in the study and their respective roles. Open Source Security Study 4
5 Table I: Included Projects It s easier to break things than make them unbreakable. John Pescatore, Gartner analyst Two to four versions of each project were downloaded and analyzed with the standard capabilities of Fortify SCA, a static analysis tool targeted at security. Security-sensitive areas of the code and operations that are often associated with security vulnerabilities, such as database queries and dynamic user interface elements, were reviewed manually to ensure consistency with the Fortify findings. Major security issues discovered by Fortify SCA were also manually verified for accuracy. Fortify SCA groups its findings into high-, medium, and low-impact groups. Due to the extensive number of vulnerabilities identified in the medium and low categories, this paper includes only the high-impact findings. In accordance with responsible disclosure guidelines, this report does not include any detailed vulnerability information. As Gartner analyst John Pescatore observed, It s easier to break things than make them unbreakable. 10 Finding and fixing vulnerabilities in existing code, while necessary, needs to be complemented with an effective security process to truly have impact. In order to evaluate the security expertise open source development organizations provide their users and measure the secure development processes that are in place for securing their software, Fortify interacted with open source maintainers and examined documented open source security practices. Key Findings When the Fortify Java Open Review (JOR) project was initially launched, it uncovered numerous flaws in a variety of open source packages. Our subsequent review of several additional code bases indicates that serious security threats stemming from numerous application vulnerabilities are a direct result of poor or nonexistent security processes. This follow-up survey found that security best practices are a low priority to the open source projects surveyed/community. Yet open source packages often claim enterprise-class capabilities but are not adopting or even considering industry best security practices. Open Source Security Study 5
6 We cannot overemphasize the importance of a dedicated security expert. Security, unlike quality, requires a unique perspective. Only a few open source development teams are moving in the right direction. For example, in July 2008, Mozilla announced a security initiative to improve the browser s security, hiring independent security consultant Rich Mogul as an advisor. 11 This action is a role model for all open source communities. Thus, though some open source packages can rightfully boast strong security teams and solid development practices, many still lack the people, process, and technology to get security right. The remainder of this section outlines evidence that supports this conclusion. Failure to Provide Access to Security Expertise We sought out three security resources that users of open source might rely on: documentation that covers the security implications and secure deployment of the software they develop, a dedicated alias for users to report security vulnerabilities, or easy access to internal security experts to discuss security issues. We found that few open source projects provide any of these resources, as summarized in Table II. Table II: Access to Security Expertise In 2005, Gartner invoked security process as a core for application security: Managers of application development and testing organizations must be willing to identify security specialists on their staffs and invest in training, education and processes for their respective teams. 13 The same prescription should apply for open source. These resources are indicative of the level of security expertise developed within an organization, and their absence leaves the project s users with little insight into the security practices of the open source project and little recourse when they experience a problem related to security. We cannot overemphasize the importance of a dedicated security expert. Security, unlike quality, requires a unique perspective. As security expert Bruce Schneier noted in his blog, Security requires a particular mindset... [Security professionals] can t vote without trying to figure out how to vote twice. 14 Open Source Security Study 6
7 Failure to Adopt a Secure Development Process In virtually every project analyzed, there were a significant number of security issues that went unaddressed over three generations of releases, sometimes spanning more than a year. Additionally, security vulnerabilities increased significantly or remained relatively constant over successive releases, as summarized in Table III. Table III: Remediation Trends Across Releases The continued presence of a large number of security issues not only represents an immediate security risk, it also demonstrates that the projects have not adopted a successful secure development process. If a secure development process existed, we would expect to see the number of security issues decrease noticeably over time. Failure to Leverage Technology to Uncover Security Vulnerabilities The number of security issues identified in the study especially in the most popular open source packages was surprising. In particular, the two most prevalent classes of vulnerabilities, Cross-Site Scripting and SQL Injection, represent a daunting challenge for open source developers. Table IV summarizes the number of issues found in these categories. Open Source Security Study 7
8 Fortify, through the Java Open Review (JOR) project, has worked with over one hundred open source development teams to identify common classes of security vulnerabilities, including Cross-Site Scripting and SQL Injection. Table IV: Cross-Site Scripting and SQL Injection Issues Fortify, through the Java Open Review (JOR) project, has worked with over one hundred open source development teams to identify common classes of security vulnerabilities, including Cross-Site Scripting and SQL Injection. However, many open source development teams have not leveraged JOR, causing them to lose a key opportunity to quickly identify and remediate security issues. Beyond JOR, a variety of open source tools, such as FindBugs, can be leveraged as part of a secure development lifecycle. The state of affairs in which we are left is disappointing. Table V summarizes the collected results for the high-impact security issues discovered by Fortify SCA for the most current version of the projects. Table V: Summary Statistics of Packages Scanned Open Source Security Study 8
9 Risk analysis and code review should be performed on any open source code running in businesscritical applications, and these processes should be repeated before new versions of open source components are approved for use. Conclusions These findings provide a call-to-action for organizations that rely on open source software. Specifically, Fortify recommends: Government and commercial organizations that leverage open source should use open source applications with great caution. Risk analysis and code review should be performed on any open source code running in business-critical applications, and these processes should be repeated before new versions of open source components are approved for use. Organizations considering open source software must thoroughly evaluate open source security practices. We recommend using the standards we recommend below to open source communities as a checklist. In addition, enterprises should: Raise security awareness within open source development communities and emphasize the importance of preventing vulnerabilities upstream. Enterprise security teams should articulate their security requirements to open source maintainers to accelerate the adoption of secure development lifecycles. Perform assessments to understand where your open source deployments and components stand from a security perspective. Open Source Security Study 9
10 Remediate vulnerabilities internally or leverage Fortify s JOR, which provides audited versions of several open source packages. Open source projects should adopt robust security practices from their commercial counterparts. Open source development can benefit from private industry practices notably those created by financial services organizations and larger ISVs. Open source communities can then advertise and substantiate effective security practices that blend process and technology. Best practices to consider include: People Appointment of a security expert with the power to veto releases from getting into production known as a gate model. Develop the expertise to conduct security activities and get security right. Process Build security in by mandating processes that integrate security proactively throughout the software development lifecycle. Include relevant non-coding activities, such as threat modeling and the development of abuse cases. Technologies Leverage technologies to get security right, which include static analysis in development and dynamic analysis during security testing in quality assurance. Specifically, open source projects can leverage advances already made in the commercial software community. With regards to developing an encompassing security development lifecycle, open source projects may want to reference Dr. Gary McGraw s book, Software Security: Building Security In. The book covers everything from threat modeling and abuse cases to code reviews and security testing. Microsoft has also made their threat modeling methodology and supporting tools available online. 15 Going further, developers can utilize the OWASP Code Review guide to help guide their own internal security reviews. 16 Fortify has made their static analysis suite available to open source projects through the Fortify Open Review project to further supplement open source security efforts. 17 With these actions in place, open source communities can then advertise and substantiate effective security practices that will encourage strong adoption. As highlighted earlier in this report, the steps taken by Mozilla are a prototype for open source security. About Larry Suto Larry Suto is an independent consultant who has consulted for Fortune 500 companies, such as Charles Schwab, Cisco, Kaiser Permanante, Pepsico and Wells Fargo. He specializes in enterprise security architecture, risk management, and software code security. Larry can be reached at [email protected]. Open Source Security Study 10
11 About Fortify Fortify Software s Business Software Assurance solutions protect companies and organizations from today s greatest security risk: the software that runs their businesses. Fortify reduces the threat of catastrophic financial loss and damage to reputation as well as ensuring timely compliance with government and industry mandates. Fortify s customers include government agencies and Global 2000 leaders in financial services, healthcare, e-commerce, telecommunications, publishing, insurance, systems integration and information technology. For more information, please visit us at References The authors would like to thank Dmitri Polejaev for his help in looking at countless lines of code Now Is the Time for Security at the Application Level, Theresa Lanowitz, Gartner December Colonel Kevin Foley, Best Practices in Cyber Defense from the US Air Force, Federal Computer Week webinar, 12 February TIOBE Programming Community Index for July 2008, 10 From Mr. Pescatore s presentation, Gartner s Threat Forecast Timeline delivered at Gartner IT Security Summit, June Example: 13 Now Is the Time for Security at the Application Level, Gartner Research, December Fortify Software Inc. More information is available at Bridgepointe Pkwy. Tel: (650) Suite 400 Fax: (650) San Mateo, California [email protected]
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Fortify Training Services. Securing Your Entire Software Portfolio FRAMEWORK*SSA
Fortify Training Services Securing Your Entire Software Portfolio FRAMEWORK*SSA Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security
Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006
Introduction to Web Application Security Microsoft CSO Roundtable Houston, TX September 13 th, 2006 Overview Background What is Application Security and Why Is It Important? Examples Where Do We Go From
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
Vulnerabilities: A 360 Degree Approach
Assessing Application Vulnerabilities: A 360 Degree Approach Dr. Brian Chess Founder and Chief Scientist Fortify ASSESSING APPLICATION VULNERABILITIES: A 360 DEGREE APPROACH WWW.FORTIFY.COM 1 Assessing
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
HP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Software Security Touchpoint: Architectural Risk Analysis
Software Security Touchpoint: Architectural Risk Analysis Gary McGraw, Ph.D. Chief Technology Officer, Cigital Founded in 1992 to provide software security and software quality professional services Recognized
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers
White Paper Guide to PCI Application Security Compliance for Merchants and Service Providers Contents Overview... 3 I. The PCI DSS Requirements... 3 II. Compliance and Validation Requirements... 4 III.
Testing the Security of your Applications
Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Testing the Security of your Applications
Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
Tackling Third-Party Patches
Tackling Third-Party Patches VMware vcenter Protect Update Catalog Delivers an Efficient, Effective Way to Extend an Organization s SCCM Infrastructure Technical WHITE PAPER Companies around the world
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
How to Secure Your SharePoint Deployment
WHITE PAPER How to Secure Your SharePoint Deployment Some of the sites in your enterprise probably contain content that should not be available to all users [some] information should be accessible only
Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services [email protected]
Microsoft Security Development Lifecycle for IT Rob Labbé Application Consulting and Engineering Services [email protected] The Reasons for Secure Software There are many threats to data and systems
White Paper. Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise
WHITE PAPER: BUSINESS CONTINUITY AND BREACH PROTECTION White Paper Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise Business Continuity and Breach
Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers
How to Protect Your from Hackers Web attacks are the greatest threat facing organizations today. In the last year, Web attacks have brought down businesses of all sizes and resulted in massive-scale data
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
ALERT LOGIC FOR HIPAA COMPLIANCE
SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
State of Web Application Security
State of Web Application Security Executive Summary Sponsored by Cenzic & Barracuda Networks Independently conducted by Ponemon Institute LLC Publication Date: February 2011 Ponemon Institute Research
VOLUME 4. State of Software Security Report. The Intractable Problem of Insecure Software
VOLUME 4 State of Software Security Report The Intractable Problem of Insecure Software December 7, 2011 Executive Summary The following are some of the most significant findings in the Veracode State
white SECURITY TESTING WHITE PAPER
white SECURITY TESTING WHITE PAPER Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion...
Application Security Center overview
Application Security overview Magnus Hillgren Presales HP Software Sweden Fredrik Möller Nordic Manager - Fortify Software HP BTO (Business Technology Optimization) Business outcomes STRATEGY Project &
Breaking down silos of protection: An integrated approach to managing application security
IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity
Application Security Testing. Jesper Kråkhede
Application Security Testing Jesper Kråkhede AST 2015-10-22 2 Others call it security and try to avoid it I call it passion and dive right into it Jesper Kråkhede Worked as a security consultant for 17
Five Steps to Secure Outsourced Application Development
Five Steps to Secure Outsourced Application Development Contents Executive Summary... 3 Software: Today s Biggest Security Risk... 4 Offshore Development Trends... 5 Five Key Steps... 6 Step 1 Risk Assessment
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
Procuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.
Managing business infrastructure White paper Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities. September 2008 2 Contents 2 Overview 5 Understanding
2015 Vulnerability Statistics Report
2015 Vulnerability Statistics Report Introduction or bugs in software may enable cyber criminals to exploit both Internet facing and internal systems. Fraud, theft (financial, identity or data) and denial-of-service
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Network Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools
A Software White Paper December 2013 Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools A Joint White Paper from Login VSI and Software 2 Virtual Desktop
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams October 13, 2012 OWASP Boston Application Security Conference Agenda Introduction / Background Vulnerabilities
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
The Path Ahead for Security Leaders
The Path Ahead for Security Leaders Executive Summary What You Will Learn If you asked security leaders five years ago what their primary focus was, you would likely get a resounding: securing our operations.
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
Leveraging Network and Vulnerability metrics Using RedSeal
SOLUTION BRIEF Transforming IT Security Management Via Outcome-Oriented Metrics Leveraging Network and Vulnerability metrics Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise
Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise White Paper Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical
WEB 2.0 AND SECURITY
WEB 2.0 AND SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
WEB APPLICATION VULNERABILITY STATISTICS (2013)
WEB APPLICATION VULNERABILITY STATISTICS (2013) Page 1 CONTENTS Contents 2 1. Introduction 3 2. Research Methodology 4 3. Summary 5 4. Participant Portrait 6 5. Vulnerability Statistics 7 5.1. The most
GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY
Penetration Testing: What You Need to Know Now GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY PENETRATION TESTING: GUIDE TO IMPROVING INFORMATION SECURITY Contact
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Enterprise Application Security Program
Enterprise Application Security Program GE s approach to solving the root cause and establishing a Center of Excellence Darren Challey GE Application Security Leader Agenda Why is AppSec important? Why
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
How To Ensure That Your Computer System Is Safe
Establishing a Continuous Process for PCI DSS Compliance Visa, MasterCard, American Express, and other payment card companies currently require all U.S. merchants accepting credit card payments to comply
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
Is your software secure?
Is your software secure? HP Fortify Application Security VII konferencja Secure 2013 Warsaw - October 9, 2013 Gunner Winkenwerder Sales Manager Fortify CEE, Russia & CIS HP Enterprise Security +49 (172)
Leveraging OWASP to Reduce Web App Data Breach Risk
Leveraging OWASP to Reduce Web App Data Breach Risk P R E S E N T E D B Y J O H N VERRY P R I N C I P A L S E C U R I T Y C O N S U L T A N T P I V O T POINT SECURITY www.pivotpointsecurity.com Specialists
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
