Главная
Study mode:
on
1
Intro
2
Risk
3
Introduction
4
National Phenology Database
5
Heartbleed
6
Common Vulnerability Scoring System
7
Dependency Check
8
Demo
9
Dependency Track
10
Springwood vulnerability
11
Jackson vulnerability
12
Fixing the vulnerability
13
Checking the base code
14
Checking the dependencies
15
Jenkins plugin
16
Jenkins report
17
Docker image
18
API Key
19
Flag Security Vulnerability
Description:
Discover how to identify and monitor hidden vulnerabilities in your application dependencies in this 27-minute conference talk from Devoxx. Learn about vulnerability indexing systems like NVD and CVE, as well as severity scoring using CVSS. Explore the creation of a Continuous Security pipeline using Jenkins and open-source tools such as OWASP DependencyCheck and DependencyTrack. Gain insights into the DevSecOps philosophy and see practical demonstrations of vulnerability detection, tracking, and mitigation. Cover topics including the National Phenology Database, Heartbleed, common vulnerability scoring, and specific vulnerabilities in popular frameworks like Spring and Jackson. Walk through the process of fixing vulnerabilities, checking base code and dependencies, and implementing security measures using Jenkins plugins, Docker images, and API keys.

Find and Track the Hidden Vulnerabilities Inside Your Dependencies

Devoxx
Add to list
0:00 / 0:00