Social Network For Security Executives: Help Make Right Cyber Security Decisions
RSA conference is one of the leading security conference worldwide. It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.
Application security testing are tools and services that helps you discover security vulnerabilities in all kinds of applications. Current application security practices/tools available broadly falls into following…
ContinueAdded by Denise on November 29, 2019 at 3:30pm — No Comments
WAF is specialized firewall designed to protect web applications (HTTP applications) from attacks such as cross-site scripting (XSS), SQL injection and other vulnerabilities that may exist. A WAF is able to detect and prevent unknown attacks by inspecting every HTML, HTTP/HTTPS, SOAP and XML-RPC data packet. Using WAF you can monitor the Input/Output traffic to your web applications. A WAF can also monitor access to web applications and can send access log data to other security tools…
ContinueAdded by Denise on November 29, 2019 at 2:00pm — No Comments
Added by Denise on November 29, 2019 at 1:00pm — No Comments
RSA conference is one of the leading security conference worldwide. It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape. WAF is specialized firewall designed to protect web applications (HTTP applications) from attacks such as cross-site scripting (XSS), SQL injection and other vulnerabilities that may exist in. It is able to detect and prevent unknown attacks by inspecting…
ContinueAdded by pritha on November 28, 2019 at 5:30pm — No Comments
There is a plethora of web application scanner; every one of which claims to be better than the other. It is indeed a challenge to differentiate between them. We need to benchmark the application scanner against hard facts and not marketing claims. Below are some of the most critical metrics against which you would like to benchmark web application scanner.
Added by pritha on November 28, 2019 at 5:30pm — No Comments
From our experience of helping organisations in building their ‘Vulnerability Management’ program, we feel that one of the major challenge the security manager/management faces does not always know the reality on the grounds. Obviously, the management is extremely busy and has got too many priorities. It is natural to get into managing whirlwinds. So, I wanted to define a few questions which can help you to find out how robust is your application security management program and…
ContinueAdded by pritha on November 28, 2019 at 5:30pm — No Comments
Bug bounty programs are quite common these days with several of the biggest names in the industry have launched various avatars of the program. I have been asked by a few security managers and managements about should they launch a bug bounty program. Definitely bug bounty program has the advantage of crowd sourcing. However an organization should be mature and prepared enough to launch such a program. Here are some questions which shall tell you if you are prepared or not. You…
ContinueAdded by pritha on November 28, 2019 at 5:30pm — No Comments
Formal Modeling and Automation is one of the things I love. I try to model everything and sometimes modeling helps and sometime it lands me in trouble. It helped me when I tried to model Penetration Testing and worked with my co-founder to design our first version of automated Penetration Testing Tool at iViZ. Where it did not help is in dancing. I think I am a poor dancer since my mind thinks modeling. By the time I model the step in my mind, I miss the beat. I believe there…
ContinueAdded by pritha on November 28, 2019 at 5:30pm — No Comments
Choosing the right Application Security Testing Service Provider is not always an easy task. By asking the right questions and knowing what answers to look for, you can conduct the thorough evaluation of the various vendors available in the market and make the most intelligent choice for your business.There are numerous options like buying tools, using cloud based testing providers or the traditional consultants. I have discussed making the right choice in…
ContinueAdded by pritha on November 28, 2019 at 5:30pm — No Comments
Over the past decade, E-Commerce applications have grown both in terms of numbers and complexity. Currently, E-Commerce application are going forward becoming more personalized, more mobile friendly and rich in functionality. Complicated recommendation algorithms are constantly running at the back end to make content searching as personalized as possible. Here we will learn about the necessity of penetration testing for E-commerce Applications.
…
ContinueAdded by pritha on November 28, 2019 at 5:11pm — No Comments
The AppSec How -To:
Visualizing and Effectively Remediating Your Vulnerabilities: The biggest challenge when working with Source Code Analysis (SCA) tools is how to effectively prioritize and fix the numerous results. Developers are quickly overwhelmed trying to analyze security reports containing results that are presented independently from one another.
Take for example,…
ContinueAdded by pritha on November 28, 2019 at 5:00pm — No Comments
Following are the top 5 Application Security Technology Trends:
Today applications mostly rely on external protection like IPS (Intrusion Prevention Systems), WAF (Web Application Firewall)etc and there is a great scope for a lot of these security features being built into the application so that it can protect itself during…
ContinueAdded by pritha on November 28, 2019 at 5:00pm — No Comments
Application Security has emerged over years both as a market as well as a technology. Some of the key drivers had been the explosion in the number of applications (web and mobile), attacks moving to the application layer and the compliance needs.
1. Beyond Tools – Build Application Security…
ContinueAdded by pritha on November 28, 2019 at 5:00pm — No Comments
Static Code Analysis is the technique of automatically analyzing the application’s source and binary code to find security vulnerabilities. According to Gartner’s 2011 Magic Quadrant for Static Application Security Testing (SAST), “SAST should be considered a mandatory requirement for all IT organizations that develop or procure application”. In fact, in recent years we have…
ContinueAdded by pritha on November 28, 2019 at 5:00pm — No Comments
Over the last few years, our On-Demand and Hybrid Penetration Testing platform has performed security testing of applications across various verticals and domains including Banking, e-commerce, Manufacturing, Enterprise Applications, Gaming and so on. On one side, SQL Injection, XSS and CSRF vulnerabilities are still the top classes of vulnerabilities found by our automated scanning system, on the other hand however, there are a lot of…
ContinueAdded by pritha on November 28, 2019 at 5:00pm — No Comments
This blog will provide information about SAST or Static Application Security Testing and DAST or Dynamic Application Security Testing. And also answer the common question of SAST vs DAST.
SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need a running…
ContinueAdded by pritha on November 28, 2019 at 4:30pm — No Comments
Penetration testing vendors will often make promises and assurances that they can test your Web Applications safely and comprehensively in your production environment. So when performing Penetration Testing of a Web Application that is hosted in a Production Environment you need to consider the following myths and facts which can directly or indirectly end up causing…
ContinueAdded by pritha on November 28, 2019 at 4:30pm — No Comments
I have seen several organizations trying to adopt secure SDLC and failing badly towards the beginning. One of the biggest reason is they try to use “Big Bang Approach”. Yeah, there are several consultants who will push you to go for a big project use the classical waterfall model to adopt secure SDLC. But that’s asking too much. Changing the habits of a group is not very easy.
Typically there is a big push back and…
ContinueAdded by pritha on November 28, 2019 at 4:30pm — No Comments
This blog will provide the pros and cons of different types of Application Security Testing Technologies, and checklist to chose among them.
SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need a running…
ContinueAdded by pritha on November 28, 2019 at 4:30pm — No Comments
Added by CISO Platform on November 28, 2019 at 4:00pm — No Comments
2019
2018
2017
2016
2015
2014
2013
2012
1999
# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
© 2019 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service