Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Reporting Live From Collision Conference 2021: Part Two!

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Reporting Live From Collision Conference 2021: Part Two!


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: veracode.com

If you caught part one of our recap series on this year???s Collision conference, you know we covered a roundtable talk hosted by Veracode???s own Chris Wysopal. The talk focused on the risks of AI and machine learning, delving into discussions of how to manage the security aspects of these future-ready technologies ???๏พ‚?especially when it comes down to consumer privacy.๏พ‚?

Chris also had the opportunity to host a session of his own, covering the critical aspects of modern application security and the reasons that organizations need to get serious about security-minded approaches to their code. Here???s what we learned.๏พ‚?

Secure from the top down

Chris began his session Secure From the Top Down by noting that, today, it???s important to think about application and product security through the eyes of the developer or the builder. With so many applications running in the cloud and so many devices connected to the Internet of Things (IoT), Chris pointed out that the attack surface for threat actors is growing exponentially and that everyone building and deploying technology needs to consider the risks moving forward.

Connected devices are everywhere, Chris said, but they???re not typically behind a firewall. Normally, these devices are connected to 5G or Wi-Fi. According to Chris, this means devices essentially need to secure themselves and all of the connection points where they talk to other devices or they pose a security risk.๏พ‚?

Further, everything is connected through APIs today. ???We used to have big, monolithic software packages with one big block of code,??? Chris said. ???Today, we have a lot of small devices; even with applications running in the cloud, they???re built with microservices and are talking to each other through APIs.??? This is a way an attacker can exploit a device or an application, and means the builders of today need to improve the security around their APIs for a more secure tomorrow.

It???s already a problem; Chris pointed out in his session that, according to the 2020 Verizon Data Breach Investigations Report, 43 percent of breaches come from single page applications. Developers working on building these single page apps need to be more considerate with their security.๏พ‚?

Looking ahead at trends

Time is the biggest competitor for most organizations, according to Chris, and there are three main trends that are going to impact product security moving forward: ubiquitous connectivity, abstraction and componentization, and hyperautomation of software delivery.๏พ‚?

Ubiquitous connectivity

While this involves the rise of APIs and IoT devices, what it really comes down to is that each piece of software connected through the network and APIs must think about securing itself. ???Each code that is exposing an API needs to think about how it will authenticate, encrypt, and secure itself from all the bugs an attacker might exploit,??? Chris said. Chris notes that we need to make sure we have heavy API security, that we???re scanning APIs, and that we think about all of the different deployment environments a device might be in (such as Wi-Fi or 5G) to make sure those points are secure.๏พ‚?

Abstraction and componentization

As more developers rely on open source code to speed up development, organizations are taking a supply chain model approach to the way they are reviewing third-party options by these suppliers. For example, it???s helpful to have a bill of materials, a well-defined process in place, and to implement automated scanning tools to scan things in production. ???Cloud technology adoption is a shared responsibility,??? Chris noted. ???We need to start to push security towards suppliers so that they notice new problems. That???s the mindset change that needs to happen when we???re using open source code and APIs. We need to track things like a manufacturer would.???

Hyperautomation of software delivery

We???ve always automated software delivery, but Chris is seeing the trend of ???hyperautomation??? as more organizations automate every part of software delivery. This enables the concept of Everything as Code, Chris says, where everything that???s part of the pipeline is checked. ???That???s the norm now, there???s no manual process once you???ve committed code, it can go all the way to deployment. What???s enabling this is virtual infrastructures. Having a ???Security as Code??? mindset can help organizations keep up with speed and automation needs.???๏พ‚?

With these three trends taking shape, Security as Code (SaC) and Compliance as Code (CaC) mindsets are crucial to keeping that innovative momentum without sacrificing security. ???Even though we???re going faster with development, we can still go faster with security at the same time,??? Chris elaborates. ???We???re using the same techniques with security testing as we are with everything else to prevent a lag.???

As Chris looks forward, he points out that approaching this from an ???infrastructure as code??? mindset with SaC and CaC procedures in place is what will drive meaningful changes. When you approach application security from a SaC mindset, you???re shifting security measures left and implementing them sooner in the development process to catch flaws before they become problems. Shifting the scanning and patching processes left that organizations used to run in production means it???s easier to keep everything on schedule as you secure from the top down.๏พ‚?

If you missed part one of this series, you can read it here. The Veracode team had a blast attending Collision 2021, and we???re looking forward to what they have in store for next year!๏พ‚?

...



๐Ÿ“Œ Reporting Live From Collision Conference 2021: Part Two!


๐Ÿ“ˆ 62.52 Punkte

๐Ÿ“Œ Reporting Live From Collision Conference 2021: Part One!


๐Ÿ“ˆ 55.43 Punkte

๐Ÿ“Œ Bubble Collision Simulations in Milliseconds | Two Minute Papers #231


๐Ÿ“ˆ 25.86 Punkte

๐Ÿ“Œ Oracle Hospitality Reporting/Analytics 9.1.0 Reporting information disclosure


๐Ÿ“ˆ 22.85 Punkte

๐Ÿ“Œ (g+) Microsoft SQL Server Reporting Services: Wie SSRS-Reporting funktioniert


๐Ÿ“ˆ 22.85 Punkte

๐Ÿ“Œ Microsoft SQL Server Reporting Services: Wie SSRS-Reporting funktioniert - Golem.de


๐Ÿ“ˆ 22.85 Punkte

๐Ÿ“Œ Your Reporting Matters: How to Improve Pen Test Reporting


๐Ÿ“ˆ 22.85 Punkte

๐Ÿ“Œ Improve Visibility, Reporting, and Automation With Veracodeโ€™s Reporting API


๐Ÿ“ˆ 22.85 Punkte

๐Ÿ“Œ Collision 2021 | Understanding tech abuse with Avast CISO Jaya Baloo ft. NNEDV CEO Deborah Vagins


๐Ÿ“ˆ 22.36 Punkte

๐Ÿ“Œ Two drones, two crashes in two months: MoD still won't say why


๐Ÿ“ˆ 21.26 Punkte

๐Ÿ“Œ ESET Research goes to RSA Conference 2021 with two presentations


๐Ÿ“ˆ 20.84 Punkte

๐Ÿ“Œ Houston, Weโ€™ve Got a Conference! Meet Us At The Xamarin Developer Conference


๐Ÿ“ˆ 20.35 Punkte

๐Ÿ“Œ SambaXP Conference zoom links. Conference is on now !


๐Ÿ“ˆ 20.35 Punkte

๐Ÿ“Œ Linux Plumbers Conference waiting list closed; just a few days until the conference


๐Ÿ“ˆ 20.35 Punkte

๐Ÿ“Œ openSUSE + LibreOffice Conference Still On, Virtual Conference Considered


๐Ÿ“ˆ 20.35 Punkte

๐Ÿ“Œ US-CERT Warns of Domain Name Collision Flaw (May 23 and 25, 2016)


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ New Collision Attacks Against 3DES, Blowfish Allow for Cookie Decryption


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ Collision Attacks Against 64-Bit Block Ciphers


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ Vuln: IETF RFC 3279 X.509 Certificate MD5 Signature Collision Vulnerability


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ African Airline Reports Drone Collision With Passenger Jet


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ US-CERT Warns of Domain Name Collision Flaw (May 23 and 25, 2016)


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ New Collision Attacks Against 3DES, Blowfish Allow for Cookie Decryption


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ Collision Attacks Against 64-Bit Block Ciphers


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ EMC RSA BSAFE Micro Edition Suite bis 4.0.8/4.1.4 TLS 1.2 Collision schwache Authentisierung


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ Scientists Predict Star Collision Visible To The Naked Eye In 2022


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ Vuln: IETF RFC 3279 X.509 Certificate MD5 Signature Collision Vulnerability


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ First Practical SHA-1 Collision Attack Arrives


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ EMC RSA BSAFE Micro Edition Suite bis 4.0.8/4.1.4 TLS 1.2 Collision schwache Authentisierung


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ African Airline Reports Drone Collision With Passenger Jet


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ 'First ever' SHA-1 hash collision calculated. All it took were five clever brains... and 6,610 years of processor time


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ SHA-1 Collision Found


๐Ÿ“ˆ 18.78 Punkte

๐Ÿ“Œ Scientists Predict Star Collision Visible To The Naked Eye In 2022


๐Ÿ“ˆ 18.78 Punkte











matomo