Three DevSecOps Lessons Drawn from Conversations with 45 CISOs

Recently, I moderated round table discussions between dozens of CISOs at Evanta CISO Summits in Chicago and Atlanta. My colleague, Michelle Dufty, moderated a similar event in San Francisco.
The post Three DevSecOps Lessons Drawn from Conversation… Continue reading Three DevSecOps Lessons Drawn from Conversations with 45 CISOs

Anything wrong with using IMAP as authentication for a web app to achieve a kind of easy SSO?

The idea would be to wrap a server-side IMAP client in a wrapper that transforms IMAP authentication into a web API for authentication (maybe OAuth?). When the back-end application receives credentials, it then passes them onto IMAP withou… Continue reading Anything wrong with using IMAP as authentication for a web app to achieve a kind of easy SSO?

If an application has an XSS vulnerabilty, can we bypass CSRF with referer header?

Let’s say there is an XSS vulnerability in an application, and the application is not using any kind of CSRF token, just using the referer header to protect against CSRF. Referer header is validating properly. So in this case can we bypass… Continue reading If an application has an XSS vulnerabilty, can we bypass CSRF with referer header?