Explore a fresh perspective on security vulnerabilities in this 43-minute conference talk from NDC Conferences. Delve into the decomposition of vulnerabilities into familiar security controls, shifting focus from end-stage vulnerability measurement to integrating security measures throughout the software development cycle. Learn about CWEs, injection vulnerabilities, security logging, intrusion detection points, secure data handling, and fundamental security principles. Discover how to implement logging libraries, payment gateways, and single sign-on using design patterns. Gain insights on incorporating security controls from the design phase onwards, making security more developer-friendly and effective. Ideal for developers seeking to enhance the security of their software applications.
Security Vulnerabilities Decomposition - Another Way to Look at Vulnerabilities