How to interpret "Verify the use of a secure software development lifecycle that addresses security in all stages of development"?

I’ve been looking at OWASP Application Security Verification Standard 4.0.2 for a while now, and I’m trying to understand all the checkpoints in detail.
I am not sure what exactly the author of a particular point meant. Therefore, I have a… Continue reading How to interpret "Verify the use of a secure software development lifecycle that addresses security in all stages of development"?

Defining Application Security

If you’re new to Application Security, you may be confused by the different terminology and where exactly Application Security fits relative to all the different phases of application development and during runtime of applications.
The post Defining Ap… Continue reading Defining Application Security

7 Capabilities Every Web Application Firewall Should Provide

Here are 7 characteristics to look for when evaluating a WAF.
The post 7 Capabilities Every Web Application Firewall Should Provide appeared first on Radware Blog.
The post 7 Capabilities Every Web Application Firewall Should Provide appeared first on… Continue reading 7 Capabilities Every Web Application Firewall Should Provide

Satisfaction With WAFs at Only 40 Percent

A Ponemon study released in 2019 showed that satisfaction with WAFs (Web Application Firewalls) is at 40 percent, and effectiveness of WAFs rated at only 43 percent.
The post Satisfaction With WAFs at Only 40 Percent appeared first on K2io.
The post Sa… Continue reading Satisfaction With WAFs at Only 40 Percent

What is the correlation between SpiderLabs/owasp-modsecurity-crs and coreruleset/coreruleset w/r/t Docker images

We’ve been using the SpiderLabs/owasp-modsecurity-crs v3.1 image from Dockerhub for some time now. I went to upgrade to a later version and ran into some confusion about a) who/what is the active maintainer for this project b) how are dock… Continue reading What is the correlation between SpiderLabs/owasp-modsecurity-crs and coreruleset/coreruleset w/r/t Docker images

35% of External Attacks Occur Through a Web Application

Back in June of 2020 we wrote about Forrester’s new 2020 State of Application Security report.  Back then we focused on the finding that application vulnerabilities were the weakest link in application security.  In this post, we’ll talk about the find… Continue reading 35% of External Attacks Occur Through a Web Application

OWASP API Security Top 10: A Framework for Improving Your API Security Efforts

During a recent API Security conversation with a customer, I asked if they had seen the OWASP API Security Top 10 list. They had not heard about it yet, a response that is consistent with other customers as well as from industry analysts including Gart… Continue reading OWASP API Security Top 10: A Framework for Improving Your API Security Efforts

Fourth Record Year in a Row for Vulnerabilities

On December 15, 2020 we just hit another milestone with the number of vulnerabilities recorded in the US CERT Vulnerability Database (so far in 2020) exceeding the total count in 2019, marking a fourth record year of vulnerabilities discovered in produ… Continue reading Fourth Record Year in a Row for Vulnerabilities