Главная
Study mode:
on
1
Introduction
2
Web frameworks
3
Awareness
4
Central
5
Open Source
6
Heartbleed
7
Vulnerability Awareness
8
Do they really care
9
The proof is in the pudding
10
Websphere
11
Maven Central
12
Supply Chain Mechanics
13
Application Development
14
Policy
15
Component Crack Cocaine
16
Application Training
17
Licensing
18
Virus
19
XML
20
Undesirable
21
I am
22
Bacon
23
Beer and Soda
Description:
Explore the impact of OWASP A9 guideline on component vulnerability management in this 45-minute conference talk from AppSecUSA 2014. Gain insights from real-world case studies of organizations implementing best practices to manage component usage across the software lifecycle. Examine industry trends based on thousands of application analyses, and learn about successes and ongoing challenges in addressing this critical security risk. Discover practical strategies for improving your organization's approach to identifying and mitigating vulnerabilities in third-party components.

OWASP A9: Using Components with Known Vulnerabilities - A Year Later

OWASP Foundation
Add to list