<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Owaspdavef</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Owaspdavef"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Owaspdavef"/>
		<updated>2026-04-17T17:18:41Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=254997</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=254997"/>
				<updated>2019-09-27T19:27:51Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Dave Ferguson.  I'm currently Director of Product Management for Web Application Scanning at Qualys, Inc.  Previously I worked at Sabre Corporation in Southlake, TX, as a Solutions Architect for Veracode, and as a Principal Consultant on the AppSec team at FishNet Security.  I enjoy writing about application security at [https://appsecnotes.blogspot.com appsecnotes.blogspot.com]. &lt;br /&gt;
&lt;br /&gt;
More detail is on [https://www.linkedin.com/in/davefergusonappsec my LinkedIn profile].&lt;br /&gt;
&lt;br /&gt;
One of my main contributions to OWASP was the [[Forgot Password Cheat Sheet]]. Related to this effort, I was interviewed for [https://www.owasp.org/index.php/OWASP_Podcast#tab=Original_Series_with_Jim_Manico OWASP Podcast #83]. Back in 2007 I served as leader of the Kansas City OWASP chapter.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Corporate_Supporter_Bios&amp;diff=254996</id>
		<title>Corporate Supporter Bios</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Corporate_Supporter_Bios&amp;diff=254996"/>
				<updated>2019-09-27T19:18:32Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: Minor edit of Qualys info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Disclaimer: Corporate Supporter Bios are not endorsements and reflect the message of the supporter only.&lt;br /&gt;
&lt;br /&gt;
== '''Elite Corporate Members''' ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://www.allstate.com/|logo=All line hor tag cmyk pos.jpg}} ||Allstate Corporation is the largest publicly held personal lines property and casualty insurer in America, serving more than 16 million households nationwide.   Founded in 1931, Allstate has been dedicated to protecting our customers from life’s uncertainties and preparing them for the future for more than 85 years.   As the needs of our customers evolve, so does our technology and security practices to ensure our customers remain in good hands. ||https://www.allstate.com/&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== '''Premier Corporate Members''' ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot; scope=&amp;quot;col&amp;quot; width=&amp;quot;100&amp;quot; | '''Company''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot; scope=&amp;quot;col&amp;quot; width=&amp;quot;1000&amp;quot; | '''Company Description'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot; scope=&amp;quot;col&amp;quot; width=&amp;quot;100&amp;quot; | '''Contact'''&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=http://www.adobe.com|logo=Adobe_logo_standard_for_Tasha.jpg|size=300px90px}} ||Adobe is the global leader in digital marketing and digital media solutions. Our tools and services allow our customers to create groundbreaking digital content, deploy it across media and devices, measure and optimize it over time, and achieve greater business success. We help our customers make, manage, measure, and monetize their content across every channel and screen. ||http://www.adobe.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.hackerone.com/|logo=HackerOne_Logo_.jpg}} ||HackerOne (www.hackerone.com) is the #1 hacker-powered security platform, helping organizations receive and resolve critical vulnerabilities before they can be exploited. More than 1,000 organizations, including the U.S. Department of Defense, U.S. General Service Administration, General Motors, Twitter, GitHub, Nintendo, Panasonic Avionics, Qualcomm, Square, Starbucks, Dropbox and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities. HackerOne customers have resolved over 57,000 vulnerabilities and awarded over $22M in bug bounties. HackerOne is headquartered in San Francisco with offices in London and the Netherlands. ||https://www.hackerone.com/&lt;br /&gt;
|-&lt;br /&gt;
| |{{MemberLinksv2|link=https://www.netsparker.com/|logo=Netsparker-logo-transparent-h1000px-color.png}} ||Netsparker develops an industry leading automated web application security scanner. Available as Windows desktop software and as a Cloud service, the Netsparker scanner is very easy to use and its proof-based vulnerability scanning technology enables you to easily and automatically detect SQL Injection, Cross-site scripting and other vulnerabilities in your websites, web applications and web services. Netsparker’s unique scanning, detection and auto exploitation techniques allow it to be dead accurate. Therefore you do not have to waste time manually verifying the scanner’s findings and instead can focus on fixing the identified vulnerabilities. Netsparker is trusted and used by world renowned companies such as Samsung, Ernst &amp;amp; Young, Skype, NASA, ISACA and ING Bank.  || https://www.netsparker.com&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=http://www.qualys.com|logo=Qualys_logo_2017.png|size=150px45px}} || Qualys is a pioneer and leading provider of cloud-based security and compliance solutions. The Qualys Cloud Platform and its integrated apps - including Web Application Scanning (WAS) - help businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence and automating the full spectrum of auditing, compliance, and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).||https://www.qualys.com&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://www.salesforce.com/|logo=Salesforce_logo.png|size=300px90px}} ||Salesforce is the world’s #1 customer relationship management (CRM) platform. Our cloud-based applications for sales, service, marketing, and more don’t require IT experts to set up or manage — simply log in and start connecting to customers in a whole new way. ||https://www.salesforce.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=http://www.signalsciences.com|logo= Sigsci-logo_primary_(1).png|size=300px90px}} ||Signal Sciences secures the most important web applications, APIs, and microservices of the world's leading companies. Our next-gen WAF and RASP help you increase security and maintain site reliability without sacrificing velocity, all at the lowest total cost of ownership. Learn how our patented approach can help you. ||http://www.signalsciences.com&lt;br /&gt;
|-&lt;br /&gt;
|||||&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==''' Contributor Corporate Members '''==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot; scope=&amp;quot;col&amp;quot; width=&amp;quot;100&amp;quot; | '''Company''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot; scope=&amp;quot;col&amp;quot; width=&amp;quot;1000&amp;quot; | '''Company Description'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot; scope=&amp;quot;col&amp;quot; width=&amp;quot;100&amp;quot; | '''Contact'''&lt;br /&gt;
|- '&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=http://www.acunetix.com|logo=Acunetix_logo_200.png‎|size=150x45px}} ||Acunetix’s team of experienced engineers developed a lead in website, web application, and Internet-facing server analysis and vulnerability detection. Available both on-premise and online, Acunetix uses deep crawling techniques to detect exploitable vulnerabilities such as SQL injection, and all forms of Cross-Site scripting – while providing concise vulnerability reports and information on how to fix them allowing you to protect your business against impending hacker attacks. Acunetix customers include Cisco, NASA, American Express, Sony, HSBC, The Pentagon, Skype, and many more. You can find us online at www.acunetix.com.||http://www.acunetix.com&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=http://www.altitudenetworks.com/|logo=Altitude_Networks.jpg}} ||Altitude Networks tackles data security in the cloud to protect enterprises against unauthorized data access, accidental or malicious sharing to unintended individuals, and data theft.||http://www.altitudenetworks.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://aon.com/cyber-solutions|logo=Aon_Logo_Red_Tagline_RGB_-_Edited.png}} ||Aon’s Cyber Solutions offers holistic cyber security, risk and insurance management, investigative skills, and proprietary technologies to help clients uncover and quantify cyber risks, protect critical assets, and recover from cyber incidents.&lt;br /&gt;
Cyber security services provided by Stroz Friedberg Limited and its affiliates. Cyber risk services provided by Aon UK Limited and its affiliates&lt;br /&gt;
| https://aon.com/cyber-solutions&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.arxan.com/|logo=Arxan-logo-stacked_tagline_CMYK.png}} ||Arxan, the global trusted leader of application protection solutions, delivers the confidence to build, deploy, and manage an organization’s most innovative and valuable applications. Currently protecting more than 1 billion application instances across industries including financial services, mobile payments, healthcare, automotive, gaming, and entertainment, the company provides the industry’s most comprehensive application protection solution. Unlike legacy security providers that rely on perimeter-based barriers to keep bad actors out, Arxan protects applications at the source and binary code level to expand the area of trust and provides a broad range of enterprise services and patented security capabilities such as code hardening, obfuscation, encryption, and Whitebox cryptography. Founded in 2001, the company is headquartered in North America with global offices in EMEA and APAC. ||https://www.arxan.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://avatao.com/|logo=Avataologo_blue.png}} ||Avatao is an online training platform for building secure software. It offers a rich library of hands-on IT security exercises for software engineers to teach secure programming from design to deployment in a fun and intuitive way. Educating for secure software can significantly improve software quality, increase trust in a company’s brand, reduce development costs and reduce the risks of suffering significant losses from cyber-attacks. In today’s world, secure software development practices are a basic requirement and we believe the solution should be integrated into the ground roots of software development teams. The platform can be used to provide security awareness to software engineers, to enrich existing IT security training, meetups or allow self-directed learning for continuous professional development. Avatao hackathons are also an excellent method to discover talented developers and engage and build brand awareness in the community. Avatao is a creation out of CrySyS Lab, world-renowned experts in IT security. Learning communities like business teams use Avatao for an improved and efficient learning experience. Mid-size and large software and financial companies use Avatao’s gamified online training to organize security hackathons, onboard new hires or upskill software developers to build secure software. The Avatao platform was publicly launched in 2016 for end-users and business customers. Initial customers include LogMeIn (US), Prezi (HU), Microsec (HU), Emarsys (HU), Photobox (UK), and many other companies are piloting the platform including Fortune 100 companies. Avatao currently has 5000+ users and 500+ exercises. ||https://avatao.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.avinetworks.com|logo=Avi_logo_White_hiRes.jpg}} ||Avi Networks completes enterprises’ digital transformation with its software load balancer, intelligent Web Application Firewall, and modern application services. The Avi Vantage Platform is deployed across data centers and clouds, delivering better elasticity, intelligence, and cost savings by providing granular per-tenant and per-app services. Customers enjoy 5X faster application rollouts, actionable analytics, and 70% lower costs. ||https://www.avinetworks.com&lt;br /&gt;
|-&lt;br /&gt;
| |{{MemberLinksv2|link=https://www.brinqa.com/|logo=Brinqa_Logo.png}} ||Brinqa is a leading provider of unified risk management – enabling stakeholders, governance organizations, and infrastructure and security teams to effectively manage technology risk at the speed of business. Brinqa software and cloud services leverage an organization’s existing investment in systems, security, and governance programs to identify, measure, manage and monitor risk. With Brinqa, organizations are reducing response time to emerging threats, impact to the business, and technology risk and compliance costs by over 50% through real-time risk analytics, automated risk assessments, prioritized remediation, actionable insights, and improved communication. Founded in 2008 by industry leaders in risk management with a proven track record in delivering cutting edge, innovative and cost-effective solutions. Brinqa’s award-winning software and cloud services are trusted by fortune 500 companies across risk disciplines such as information technology risk, vendor risk, and regulatory compliance risk. Brinqa is headquartered in Austin, Texas and has a global presence. ||https://www.brinqa.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://www.bugcrowd.com/|logo=Bugcrowd-logo-150-50.png}} || ||https://www.bugcrowd.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=http://www.ca.com/us/default.aspx|logo=CA_logo_150x168px.jpg}} ||CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy. Learn more at https://www.ca.com/us.html || https://www.ca.com/us.html&lt;br /&gt;
|-&lt;br /&gt;
| |{{MemberLinksv2|link=https://www.cequence.ai/|logo=Cequence-logo-blue-horizontal-full_-_Edited.jpg}} || Cequence Security is a venture-backed cybersecurity software company founded in 2015 and based in Sunnyvale, CA. Its mission is to transform application security by consolidating multiple innovative security functions within an open, AI-powered software platform that protects customers web, mobile, and API-based applications – and supports today’s cloud-native, container-based application architectures.  The company is led by industry veterans that previously held leadership positions at Palo Alto Networks and Symantec. Customers include F500 organizations across multiple vertical markets, and the solution has earned multiple industry accolades. Learn more at www.cequence.ai. ||https://www.cequence.ai/&lt;br /&gt;
|-&lt;br /&gt;
| |{{MemberLinksv2|link=https://www.checkmarx.com/|logo=Checkmarx-logo-2019-horizontal - Edited.png}} ||Checkmarx is an Application Security software company, whose mission is to provide enterprise organizations with application security testing products and services that empower developers to deliver secure applications. Amongst the company's 1,000 customers are 5 of the world's top 10 software vendors and many Fortune 500 and government organizations. Checkmarx CxSAST is a highly accurate and flexible Source Code Analysis product that allows organizations to automatically scan a un-compiled/un-built code and identify hundreds of security vulnerabilities in the most prevalent coding languages. Learn more at www.checkmarx.com.  ||https://www.checkmarx.com&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=http://codedx.com/|logo=CodeDx-logo (1) (1).png|size=150x45px}}  ||Code Dx is committed to reducing barriers to effective application security. Our automated application vulnerability correlation and management tools help find and fix insecure code faster, with less effort and a smaller team. Focus your precious resources on developing valuable new features, and ship secure code faster and more often. For more information, please visit https://codedx.com/ ||https://codedx.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://www.contrastsecurity.com/|logo=Contrast_Logo_New.jpg}} ||Contrast Security delivers the world’s fastest application security software that eliminates the single greatest security risk to enterprises today. Industry research shows that application security flaws are the leading source of data breaches. Contrast can be deployed, automatically discover applications and identify vulnerabilities within seven minutes. Relying on sensors instead of expensive security experts, Contrast runs continuously and is 10 times more accurate than the competition. Unlike tedious, painful and slow legacy approaches, Contrast analyzes a complete portfolio of running applications simultaneously in real-time at any scale. As a result, organizations can act faster against threats and immediately reduce risk. More information on Contrast Security can be found at http://www.contrastsecurity.com/.  || http://www.contrastsecurity.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link= https://www.cybozu.com/|logo=Cybozu_Logo_2017.png}} ||Cybozu is a Japanese cloud computing vendor founded in 1997. Its service supports effective team collaboration hence our services are widely used from large-scaled teams like multinational enterprises to small-scaled teams like volunteer groups, clubs even families. “kintone” is one of the Cybozu’s key products released in 2011. It is called &amp;quot;no-code application platform&amp;quot; which makes work more productive through business applications. It is recognized as one of the leading vendors in” Gartner 2016 Enterprise application Platform as a Service (aPaaS), Worldwide Magic Quadrant”. Cybozu has been focusing on security enhancement. It has started &amp;quot;bug bounty project&amp;quot; in 2013 to find any vulnerabilities which may exist in its product in order to provide its customers with the most secure service possible. || https://www.cybozu.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link= https://www.delltechnologies.com/en-us/index.htm |logo=DellTech_Logo_resized.png}}  || Dell Technologies (NYSE: DELL) unique family of businesses that helps organizations and individuals build their digital future and transform how they work and live.  The company provides customers with the industry's broadest and most innovative technology and services portfolio spanning from edge to core to cloud.  The Dell Technologies family includes Dell, Dell EMC, Pivotal, RSA, SecureWorks, Virtustream and VMware. ||https://www.delltechnologies.com/en-us/index.htm&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=http://www.denimgroup.com|logo=Denim-group.png|size=150x45px}} ||Denim Group is a custom software development firm skilled in large-scale development projects across multiple platforms, languages, and applications. What makes Denim Group unique is that the company brings significant core competencies in software security to the table, offering an innovative blend of secure software development, testing and training capabilities that protect a company’s biggest asset, its data. Denim Group customers span an international client base of commercial and public sector organizations across the financial services, banking, insurance, healthcare, and defense industries. Its depth of experience building large-scale software development systems in a secure fashion has made the company's leaders recognized experts in their fields. Denim Group has been recognized as one of the 5,000 Fastest Growing Company's by Inc. Magazine several years in a row and has won multiple awards including its recent accolades as one of the best places to work in San Antonio.||http://www.denimgroup.com&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://duo.com/|logo=Duo_Logo_-_Green_(1).png}} ||Duo Security helps defend organizations against data breaches by making security easy and effective. Duo Beyond, the company's category-defining zero-trust security platform, enables organizations to provide trusted access to all of their critical applications, for any user, from anywhere, and with any device. The company is a trusted partner to more than 10,000 customers globally, including Dresser-Rand, Etsy, Facebook, K-Swiss, Random House, Yelp, Zillow, Paramount Pictures, and more. Founded in Michigan, Duo has offices in Ann Arbor and Detroit, as well as growing hubs in Austin, Texas; San Mateo, California; and London, UK.||https://duo.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.entrustdatacard.com/|logo=Entrust DataCard logo.png|size=150x45px}} ||Consumers, citizens and employees increasingly expect anywhere-anytime experiences — whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates, and secure communications. With more than 2,000 Entrust Datacard colleagues around the world and a network of strong global partners, the company serves customers in 150 countries worldwide. For more information, visit www.entrustdatacard.com. ||https://www.entrustdatacard.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://www.facebook.com/whitehat/report/|logo=Facebook-06-2015-Blue-on-White_(2).png}} ||Facebooks AppSec team is focused on discovering vulnerabilities and crafting creative solutions to eliminate them. We achieve this by doing code and design reviews, building tools, and automation, and manage our bug bounty program. Come to our booth to find out more and sign-up to win a FREE Oculus Go. ||https://www.facebook.com/whitehat/report/&lt;br /&gt;
|-&lt;br /&gt;
| |{{MemberLinksv2|link=https://www.fortinet.com/|logo=Fortinet-Logo-for-OWASP.png}} || ||https://www.fortinet.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.gemalto.com/|logo=Gemalto_Logo.jpg}} || ||https://www.gemalto.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://gosecure.net/|logo=Logo_Gosecure_(1).png}} || || https: / gosecure. &lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.here.com/en|logo=HERE_Logo_MFL_Horizontal_RGB.png|size=150x45px}} ||Mapping has always been about discovery. For centuries, two-dimensional maps guided us through the unknown to our destination. But we are no longer limited by the edges of our physical maps. In 1985, we began with the simple goal to digitize mapping and pioneer in-car navigation systems. Over the next three decades, as NAVTEQ and Nokia, we’ve built a legacy in mapping technology. Today, we're creating living three-dimensional maps that grow upwards, breathing with layers of information and insights. By partnering with world-leading automakers, we are powering 4 out of 5 in-car navigation systems in North America and Europe. But we’re not just on the road. We are capturing the world in three dimensions, readying for an autonomous future. And we’re looking beyond. From autonomous driving to the Internet of Things, we are building the future of location technology through strategic partnerships with industry leaders like Intel, NVIDIA, Mobileye, and Tencent.  With headquarters in Amsterdam and development sites that span Chicago to Berlin and across to Mumbai, we are a global team with a shared passion. From data scientists and software developers to product engineers and mapping specialists, we come together from many different backgrounds to build a better future for location technology. ||https://www.here.com/en&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.hisolutions.com/|logo=HiSolutions-Logo_150x45.jpg}} ||We combine know-how in the areas of security consulting, IT governance, risk &amp;amp; compliance with conceptual strength, innovation and implementation expertise. In addition to protecting applications and networks, our core competencies also include organizational tasks such as setting up security, risk, and service management system. HiSolutions AG is one of the leading consulting specialists for IT management and information security in Germany. More than 200 experts advise in the areas of security consulting, IT governance, business continuity management, and digitalization. We actively participate in the development of national and international standards and are involved in various research projects and university teachings. ||https://www.hisolutions.com&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.htbridge.com/|logo=High-Tech_Bridge.png}} ||High-Tech Bridge is a global provider of web and mobile Application Security Testing (AST) services. Our award-winning AST platform ImmuniWeb® combines the genius of Human Intelligence with the power of Artificial Intelligence and Machine Learning. ImmuniWeb® leverages Artificial Intelligence (AI) and Machine Learning (ML) for intelligent automation of application vulnerability scanning and acceleration of application penetration testing. High-Tech Bridge's security experts from our CREST-accredited SOC look for the most complicated application vulnerabilities and attack vectors in instant synchronization and correlation with automated vulnerability scanning. Invented by High-Tech Bridge, this type of hybrid security testing, enhanced with AI/ML, delivers the most comprehensive vulnerability detection rate, continuously reduces human intervention without impacting the quality of testing, and contractually guarantees zero false-positives to every customer. ||https://www.htbridge.com&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.imperva.com/|logo=Imperva_logo.png}} ||Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Founded in 2002, we have enjoyed a steady history of growth and success, generating $264 million in 2016, with over 5,200 customers and more than 500 partners in 100+ countries worldwide.||https://www.imperva.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=http://www.informationbuilders.com|logo=IBI_Logo.jpg|size=150x45px}} ||Founded in 1975, Information Builders continues to deliver state-of-the-art technology that is transforming business in all commercial industries, government, and education. We remain one the largest independent, privately held companies in the software industry. Headquartered above Madison Square Garden in New York, Information Builders operates in more than 60 global locations and has built an active customer base of tens of thousands of major installations at the world's leading organizations. Information Builders is not only a major software supplier to our customers, but also a major provider to the leading software vendors in the industry including HP, IBM, Oracle, SAP, Teradata, and many others. In addition to our commitment to superior software engineering, we are equally proud of our people. Some of the most talented and creative professionals in the industry work at Information Builders and are passionate about what they do. In fact, the professionalism and tenure of our employees is often cited as a major differentiator by our customers. Our reputation for customer service has garnered us the highest honors from “CRM” magazine, the SSPA, and the American Business Awards. Our products and services have received top recognition from independent analyst research firms including Gartner, Forrester, Ventana Research, BARC, Butler, Bloor, and The Data Warehouse Institute (TDWI). Most importantly, our customers have received the most information technology and business awards for their accomplishments. More than 50 of our customers have had their information systems inducted into the Smithsonian Institute for superior information technology achievement through the Computerworld Honors Program. http://www.informationbuilders.com/about_us ||http://www.informationbuilders.com&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.ipswitch.com/|logo=Ipswitch_logo.png}} ||Ipswitch is an IT management software developer for small and medium-sized businesses. The company was founded in 1991 and is headquartered in Burlington, Massachusetts and has operations in Atlanta (Alpharetta) and Augusta, Georgia, American Fork, Utah, Madison, Wisconsin and Galway, Ireland. Ipswitch sells its products directly, as well as through distributors, resellers, and OEMs in the United States, Canada, Latin America, Europe, and the Pacific Rim. ||https://www.ipswitch.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=www.iriusrisk.com|logo=Logo_irius_150_45.png}} ||IriusRisk makes DevSecOps a reality with its pioneering threat modeling and SDL risk management platform. IriusRisk is a powerful tool to ensure security is woven into the design phase and followed up into production. It operates as a central orchestration point for teams to threat model and manage risk with real-time updates throughout the SDL. Built for integration, simplicity, scale, and speed, IriusRisk is the glue to bind Security, Operations &amp;amp; Development together. IriusRisk is a trusted partner of some of the largest financial institutions in the world and we pride ourselves on being fast to adapt, agile, flexible, responsive and ahead of the curve. IriusRisk operates globally and stands ready to partner with you. Contact us for more information and to request a demo. || www.iriusrisk.com&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=http://www.johnsoncontrols.com/content/us/en/products/building_efficiency/product-security.html|logo=Johnson_Controls.jpg}} ||Johnson Controls is a global diversified technology and industrial leader serving customers in more than 150 countries. Our 130,000 employees create quality products, services, and solutions to optimize energy and operational efficiencies of buildings; lead-acid automotive batteries and advanced batteries for hybrid and electric vehicles; and seating components and systems for automobiles. Our commitment to sustainability dates back to our roots in 1885, with the invention of the first electric room thermostat. Through our growth strategies and by increasing market share we are committed to delivering value to shareholders and making our customers successful. In 2015, Corporate Responsibility Magazine recognized Johnson Controls as the #14 company in its annual “100 Best Corporate Citizens” list.”||http://www.johnsoncontrols.com/content/us/en/products/building_efficiency/product-security.html&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://jscrambler.com/en/|logo=Jscrambler-logo.jpg}} ||Jscrambler is the leader in JavaScript Application Integrity and the only to offer RASP capabilities to your JS applications.As JavaScript becomes the standard for building websites, hybrid mobile applications, or other application types, most of the code is still completely exposed. With Jscrambler you can make your application self-defensive and resilient to both tampering and reverse-engineering attempts. Jscrambler is trusted by hundreds of companies (including Fortune 500) around more than 130 countries and is supported by a team of JS experts. ||https://jscrambler.com/en/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.kennasecurity.com/|logo=Kenna_Security_Logo.png}} ||Kenna Security provides a Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization’s weaknesses. Kenna accomplishes this by automating the integration of customer’s vulnerability scan data with exploit intelligence data from multiple sources, including 0-day data. Kenna then analyzes the data against active Internet breaches to identify the most critical threats before hackers can attack. &lt;br /&gt;
||https://www.kennasecurity.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://www.kiuwan.com/|logo=Kiuwan_Logo_150x45.png}} ||Kiuwan provides an end-to-end Software Analytics platform that offers objective data to make informed decisions to secure, analyze and control the entire SDLC of any application portfolio. With Kiuwan Code Security, the scope in threat mitigation is unparalleled, with over 4000+ custom rules, ability to suppress defects and create tailored action plans while meeting the most stringent industry standard requirements. In constant evolution, it boasts broad language support and integration with Jira, Jenkins, and Github to name but a few of the possibilities brought about by the platform. ||https://www.kiuwan.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=http://mediatrust.com/|logo=TMT_Horiz_ShieldLogo_RGBGradient-Tagline_-_Edited.png}} || ‎The Media Trust is on a mission: fixing the internet. To make the internet a healthier, more valuable place for businesses, governments and consumers, The Media Trust’s centralized platform provides real-time visibility and insight into non-compliant activity and threats operating in enterprise website and mobile app environments. With an emphasis on third-party code beyond libraries, the platform identifies all executing code (including code from first, third and nth parties), analyzes its behavior, assesses compliance with company policies, and resolves violating behavior. The ability to manage third-party digital risk helps defend against website breaches which can lead to regulatory fines, revenue loss, and reputational harm. ||http://mediatrust.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://about.mercari.com/en/|logo=Mercari_service_primary_horizontal_(1).png}} ||Mercari is a C2C marketplace app that makes it easy for people to safely sell and ship their things. Launched in 2013, it's now among the largest peer-to-peer selling platforms globally. From fashion to toys, shoes to electronics and beyond, Mercari's mission is to ‘create value in a global marketplace where anyone can buy and sell’. ||https://about.mercari.com/en/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=http://www.netspi.com|logo=NETSPI_Logo_2017_PNG-01.png|size=150x45px}} ||NetSPI is a privately held information-security consulting company founded in 2001. By using its consulting team's deep security knowledge and its CorrelatedVM vulnerability management &amp;amp; reporting solution, the company is a trusted advisor to large enterprises. NetSPI provides a range of assessment and advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. Clients include large financial services firms, retailers, healthcare organizations and technology companies. ||http://www.netspi.com&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.nowsecure.com/|logo=NowSecure150x45.png}} ||Only the NowSecure Platform delivers automated 360-degree coverage of mobile app security testing with the speed and depth modern enterprises require. The world’s most demanding organizations and advanced security teams trust NowSecure to identify the broadest array of security, privacy, and compliance gaps in custom, third-party, and business-critical mobile apps. ||https://www.nowsecure.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://www.oneconsult.com/en/|logo=Oneconsult_2018_logo.png|size=150x45px}}‎ ||Oneconsult group is your renowned Swiss cyber security services partner since 2003 with offices in Switzerland and Germany and 1500+ completed [https://www.google.com/url?hl=en&amp;amp;q=https://www.oneconsult.com/en/references/&amp;amp;source=gmail&amp;amp;ust=1518265556865000&amp;amp;usg=AFQjCNGmU2gOkH7NZzNBJMr-Fa6VUzw5NQ security projects] worldwide. Get expert advice from an owner-managed and vendor-independent consultancy with 35+ highly [https://www.oneconsult.com/en/team/ qualified cyber security experts], including certified penetration testers (OPST, OPSA, OSCP, OSCE, GXPN), digital forensics specialists (GCFA, GCFE, GREM), ISO security auditors (ISO 27001 Lead Auditor, ISO 27005 Risk Manager) and dedicated IT security researchers to solve even your most demanding information security challenges. Together we address your external and internal threats such as malware infections, hacker attacks and APT as well as digital fraud and data leakage with core services like [https://www.google.com/url?hl=en&amp;amp;q=https://www.oneconsult.com/en/penetration-test-en/&amp;amp;source=gmail&amp;amp;ust=1518265556866000&amp;amp;usg=AFQjCNHi0GC7EXHERYWB4vQF3qRgnoPMbg penetration tests / ethical hacking, real-life APT tests] and [https://www.oneconsult.com/en/iso-27001-security-audit/ ISO 27001 security audits]. In case of emergency, One consults [https://www.oneconsult.com/en/incident-response-it-forensics/ incident response &amp;amp; IT forensics] team supports you with around-the-clock expert assistance (24 h x 365 days).||English: https://www.oneconsult.com/en/&lt;br /&gt;
Deutsch: https://www.oneconsult.com/de/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link= https://www.oxfordwebapps.co.uk/|logo=Oxfordwebapps-owasp-logo.png}} ||Since 1995 we have always developed the most up-to-date and progressive digital solutions designed to empower people. Our mission is to deploy the latest proven technology to deliver unique products with astounding performance. Our Oxford based team are responsible for delivering our full range of services which includes the design, development, hosting, supporting and testing of interactive Web Applications and websites.||https://www.oxfordwebapps.co.uk/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.panasonic.com/|logo=Panasonic_Logo.jpg}} ||100 years ago, Panasonic started with a desire to create things with value. Since then, the challenge has continued into various fields including home appliances to realize &amp;quot;A Better Life, A Better World&amp;quot;. &lt;br /&gt;
Considering product security as part of quality management, we have strived to improve the security of products. Specific activities include threat analysis during the design process, and vulnerability testing before shipment. After shipment, Panasonic PSIRT: Product Security Incident Response Team works to respond to incidents toward a quick resolution. &lt;br /&gt;
To provide products that our customers can use with a peace of mind, we will continue product security initiatives.&lt;br /&gt;
||https://www.panasonic.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=http://tech.pingan.com/en/|logo=PingAn_Logo.png}} ||Ping An Technology (PATech), a wholly-owned subsidiary of Ping An Group, is committed to using AI, intelligent cognition, blockchain, cloud and other cutting-edge technologies to create a new cloud-based human life. PATech is the high-tech core and tech business incubator among Ping An Group, and be responsible for the development and operation of the critical platforms and services for the Group.  As an independent entity, with smart technology as a means and smart manufacturing as a blueprint, PATech focuses on the finance, healthcare and smart city areas, applies the technological capabilities certified by international authoritative certifications to actual business scenarios. || http://tech.pingan.com/en/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=http://www.rakuten.com|logo=Rakuten-Global-150x45_72dpi.JPG}} ||Rakuten, Inc. and its consolidated subsidiaries and affiliates (&amp;quot;Rakuten Group&amp;quot;) are full-line Internet services companies. Since its founding in 1997, Rakuten, Inc. (&amp;quot;Rakuten&amp;quot;) has spent a decade evolving its business model centered on e-commerce, to create a market completely new to Japan. The Rakuten Group is focusing on two approaches, in particular, to target growth in the decade to come. The first is to empower people and society through continuous innovation and business operation based on our five concepts of success. The second is to establish a &amp;quot;Rakuten eco-system&amp;quot; which enables us to maximize our customers lifetime value and leverage synergies. Guided by the key phrase &amp;quot;more than Web&amp;quot;, the Rakuten Group is taking on the challenge of creating new value by driving convergence between the Internet and traditional &amp;quot;bricks and mortar&amp;quot; businesses. ||http://www.rakuten.com &lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.securebrain.co.jp/eng/|logo=SBC_Hitachi_Group1_-_Edited.png}} ‎||SecureBrain (A Hitachi Group Company) is a leader in providing software and services to help protect enterprises and their customers against cybercrime including online fraud and malware attacks.&lt;br /&gt;
To ensure that our customers are always protected from the latest trend of cybercrime, SecureBrain has its own advanced security research center. Team of security researchers works closely with many Japanese government research agencies to research and develop solutions against the latest cyber threats. &lt;br /&gt;
||https://www.securebrain.co.jp/eng/ &lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://securecodewarrior.com/|logo=Scw_white_v_(3).png}} ||Secure Code Warrior is a global security company that makes software development better and more secure. Our vision is to empower developers to be the first line of defense in their organization by making security highly visible and providing them with the skills and tools to write secure code from the beginning. We have built a powerful platform that moves the focus from reaction to prevention, training and equipping developers to think and act with a security mindset as they build and verify their skills, gain real-time advice and monitor skill development. Our customers include financial institutions, telecommunications providers and global technology companies in Europe, North America and the Asia Pacific. To learn more, visit https://securecodewarrior.com&amp;lt;nowiki/&amp;gt;.||https://securecodewarrior.com/&lt;br /&gt;
|-&lt;br /&gt;
| |{{MemberLinksv2|link=http://www.securitycompass.com/|logo=Securitycompass-stacked_(1).jpg}} ||Security Compass is a leader in helping customers proactively manage cybersecurity risk without slowing down their business.  Offering Advisory Services, Training, and SD Elements, an award-winning policy to procedure platform for security and compliance.  Security Compass enables organizations to rapidly and efficiently deliver technology that's secure by design.  Security Compass serves some of the world's largest businesses including seven of the 15 largest financial institutions and four of the 10 largest technology companies in North America. &lt;br /&gt;
||http://www.securitycompass.com&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://securityinnovation.com|logo=Security_Innovation.png}} || Security Innovation is a pioneer in software security and trusted advisor to its clients. Since 2002, organizations have relied on our assessment and training solutions to make the use of software systems safer in the most challenging environments – whether in Web applications, IoT devices, or the cloud. The company’s flagship product, [https://www.securityinnovation.com/training/cmd-ctrl-cyber-range-security-training/ CMD+CTRL Cyber Range], is the industry’s only simulated Web site environment designed to build the skills teams need to protect the enterprise where it is most vulnerable – at the application layer. Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information, visit [https://www.securityinnovation.com/ www.securityinnovation.com] or connect with us on [https://www.linkedin.com/company/security-innovation/ LinkedIn] or [https://twitter.com/secinnovation Twitter].&lt;br /&gt;
||https://securityinnovation.com&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://blog.shiftleft.io/|logo=ShiftLeft.png}} || || https://blog.shiftleft.io/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=http://www.sonatype.com|logo=Son_logo_main_vertical2x_-_Edited.png}} ||There are a staggering volume and variety of open source and third-party component parts flowing through every development environment in the world. If properly sourced and managed, these components are a tremendous source of energy for accelerating innovation. If not, they lead directly to security vulnerabilities, licensing risks, enormous rework, and waste. With over 120,000 installations and counting, Sonatype’s Nexus products are helping modern development organizations intelligently source, manage, assemble, and maintain open-source and third-party components, so they can improve the quality, security, and speed of their software supply chains.|| http://www.sonatype.com&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://developer.springcm.com/|logo=SpringCM_Logo.png}} ||SpringCM delivers an innovative document workflow and management platform, powering the leading contract management application. SpringCM empowers companies to become more productive by reducing the time spent managing mission-critical business documents. Intelligent, automated workflows enable document collaboration across an organization from any desktop or mobile device. Delivered through a secure cloud platform, SpringCM’s document and contract management solutions work seamlessly with Salesforce or as a standalone solution. Every day, more than 600 companies use SpringCM to improve customer experience and get more done, faster. For more information about SpringCM, visit [http://www.springcm.com www.springcm.com]. ||https://developer.springcm.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://www.symantec.com/https://www.symantec.com/|logo=NI-SYM_Horiz_web150x40.jpg}} ||Symantec Corporation (NASDAQ: SYMC), the world’s leading cybersecurity company, helps organizations, governments, and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud, and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For more information, please visit www.symantec.com. ||https://www.symantec.com&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://www.synopsys.com/|logo=Synopsys_Logo.jpg}} || Synopsys technology is at the heart of innovations that are changing the way we live and work. The Internet of Things. Autonomous cars. Wearables. Smart medical devices. Secure financial services. Machine learning and computer vision. These breakthroughs are ushering in the era of Smart, Secure Everything―where devices are getting smarter, everything’s connected, and everything must be secure. Powering this new era of technology are advanced silicon chips, which are made even smarter by the remarkable software that drives them. Synopsys is at the forefront of Smart, Secure Everything with the world’s most advanced tools for silicon chip design, verification, IP integration, and application security testing. Our technology helps customers innovate from Silicon to Software, so they can deliver Smart, Secure Everything. ||https://www.synopsys.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.tcell.io/|logo=TCell.io_logo.png}} ||tCell moves application security out of the network for cloud-first organizations. Using advanced runtime application self-protection technology, tCell protects applications in-production from XSS, Commandi, SQLi, Account Takeover, and OWASP Top 10 attacks. Whether an organizations’ applications are on-premises or cloud-based, tCell's unique approach makes application security easy.&lt;br /&gt;
||https://www.tcell.io/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=http://www.thoughtworks.com|logo=ThoughtWorks Logo.png|size=150x45px}} ||We are a software company and community of passionate, purpose-led individuals. We think disruptively to deliver technology that addresses our clients’ toughest challenges, all while seeking to revolutionize the IT industry and create positive social change. ThoughtWorks' 3,000 professionals serve clients from offices in Australia, Brazil, Canada, China, Ecuador, Germany, India, Italy, Singapore, South Africa, Turkey, Uganda, the United Kingdom, and the United States.  ThoughtWorks releases a regular technology radar, a study that looks at the key trends that impact software development and business strategies. The Radar helps companies stay on top of topics that are constantly evolving, such as security, and offers insight and practical tools to build secure systems at every stage of the development process. ||http://www.thoughtworks.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://www.twistlock.com/|logo=Twistlock_2017_Logo-Lockup_TM_RGB_copy.jpg}} ||Twistlock is the most complete, automated and scalable cloud native cybersecurity platform. Trusted by hundreds of customers worldwide, Twistlock uses the strengths of cloud native to provide better security for teams using Docker, Kubernetes, Lambda, Fargate, and other modern technologies. ||https://www.twistlock.com/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://vex.ubsecure.jp/lpen||logo=Ubsecure-logo.png}} ||UBsecure is a leading web application security company based in Japan since 2007. We offer various security solutions for web application and smartphone application by utilizing in-house developed application security testing tool, Vex. Vex built by a tremendous amount of experience in professional security scanning and by its continuous feedback. The unique characteristic of the tool is that it used as a stand-alone security testing tool as well as the seamless security testing component within the SDLC. Therefore, Vex is not only for professional security auditors but also for software developers who need secure development cycles. Please visit our site for more information about Vex.||https://vex.ubsecure.jp/lpen&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.ups.com/us/en/Home.page|logo=UPS.jpg}} || ||https://www.ups.com/us/en/Home.page&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.veracode.com/|logo=VeraCode_logo.png}} || Veracode gives companies a comprehensive view of security defects so they can create secure software, and ensure the software they are buying or downloading is free of vulnerabilities. As a result, companies using Veracode are free to boldly innovate, explore, discover, and change the world.&lt;br /&gt;
||https://www.veracode.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://www.verizondigitalmedia.com/platform/edgecast-cdn/security/|logo=Verizon_Digital_Medial_Logo.jpg}} ||Verizon Digital Media Services offers a global, PCI-compliant content delivery network to protect websites, applications and user data at every layer. Integrated with our industry-leading platform, our Cloud Security Solution offers world-class protection, performance and scale to keep your business online. Our network features:&lt;br /&gt;
*An advanced Web Application Firewall (WAF) to protect web applications against attacks&lt;br /&gt;
*Robust DDoS protection with massive capacity to thwart the largest attacks&lt;br /&gt;
*Bot mitigation to defend against automated threats and bad bots&lt;br /&gt;
*Added protection for web servers to defend against direct-to-origin attacks&lt;br /&gt;
*Built-in DNS protection with DNSSEC to prevent injection of fraudulent records&lt;br /&gt;
*A security operations team ready to provide a fully managed security offering&amp;lt;br&amp;gt;&lt;br /&gt;
Contact us today to learn more about our Cloud Security Solution or visit us at [http://www.verizondigitalmedia.com www.verizondigitalmedia.com]. &lt;br /&gt;
||https://www.verizondigitalmedia.com/platform/edgecast-cdn/security/&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://wallarm.com/|logo=Wallarm Logo (1).png|size=150x45px}} || Wallarm delivers automated cloud-native application and API security throughout application development and deployment lifecycle. &lt;br /&gt;
Wallarm AI-powered Application Security Platform includes FAST for CI/CD-integrated security test automation during development and Advanced WAF attack blocking and vulnerability protection after deployment. &lt;br /&gt;
Wallarm platform aligns security and development into a unified pipeline:&lt;br /&gt;
# Detects OWASP Top 10, 0 day and behavioral issues      &lt;br /&gt;
# Provides highly accurate detection based on patent-pending technology      &lt;br /&gt;
# Improves security test coverage by automatically generating and running tests      &lt;br /&gt;
# Automates issue management with deep learning, policies and build in active rechecker      &lt;br /&gt;
# Provide easy-to-manage multi-tenant multi-application unified management platform   &lt;br /&gt;
|| https://wallarm.com/&lt;br /&gt;
|-&lt;br /&gt;
| {{MemberLinksv2|link=https://www.whitehatsec.com/|logo=WhiteHat_2016_Primary_Logo.png}} ||WhiteHat Security is the leader in application security, enabling businesses to protect critical data, ensure compliance, and manage risk. Through a combination of technology, over a decade of intelligence metrics, and the judgment of people, WhiteHat Security provides complete web security at a scale and accuracy unmatched in the industry.||https://www.whitehatsec.com&lt;br /&gt;
|-&lt;br /&gt;
|{{MemberLinksv2|link=https://www.whitesourcesoftware.com/|logo=Whitesource_logo.png}} ||WhiteSource helps software security teams manage open source components used in their products, automatically and continuously. It becomes part of your SDLC and automates the entire process of open source components selection, approval, and management, including finding and fixing vulnerable components.&lt;br /&gt;
||https://www.whitesourcesoftware.com&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=236447</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=236447"/>
				<updated>2017-12-28T05:15:51Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Dave Ferguson.  I'm currently Product Manager for Web Application Scanning at Qualys, Inc.  Previously I worked at Sabre Corporation in Southlake, TX, as a Solutions Architect for Veracode, and as a Principal Consultant on the application security team at FishNet Security.  I enjoy writing about application security at [http://appsecnotes.blogspot.com appsecnotes.blogspot.com]. &lt;br /&gt;
&lt;br /&gt;
More detail is on [http://www.linkedin.com/in/davefergusonappsec my LinkedIn profile].&lt;br /&gt;
&lt;br /&gt;
One of my main contributions to OWASP was the [[Forgot Password Cheat Sheet]]. Related to this effort, I was interviewed for [[OWASP Podcast]] #83. Back in 2007 I served as leader of the Kansas City OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
Earlier in my career, I was a Java web application developer, C/C++ programmer, and mechanical engineer.  Feel free to contact me at gmdavef[at]gmail com.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Forgot_Password_Cheat_Sheet&amp;diff=229885</id>
		<title>Forgot Password Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Forgot_Password_Cheat_Sheet&amp;diff=229885"/>
				<updated>2017-05-22T15:26:42Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: Removed superfluous &amp;quot;Delete&amp;quot;.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
This article provides a simple model to follow when implementing a &amp;amp;quot;forgot password&amp;amp;quot; web application feature.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= The Problem =&lt;br /&gt;
&lt;br /&gt;
There is no industry standard for implementing a Forgot Password feature. The result is that you see applications forcing users to jump through myriad hoops involving emails, special URLs, temporary passwords, personal security questions, and so on. With some applications you can recover your existing password. In others you have to reset it to a new value.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Steps  =&lt;br /&gt;
&lt;br /&gt;
== Step 1) Gather Identity Data or Security Questions ==&lt;br /&gt;
The first page of a secure Forgot Password feature asks the user for multiple pieces of hard data that should have been previously collected (generally when the user first registers). Steps for this are detailed in the identity section the Choosing and Using Security Questions Cheat Sheet [https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet#Step_1.29_Decide_on_Identity_Data_vs_Canned_Questions_vs._User-Created_Questions here].&lt;br /&gt;
&lt;br /&gt;
At a minimum, you should have collected some data that will allow you to send the password reset information to some out-of-band side-channel, such as a (possibly different) email address or an SMS text number, etc. to be used in Step 3.&lt;br /&gt;
&lt;br /&gt;
== Step 2) Verify Security Questions ==&lt;br /&gt;
&lt;br /&gt;
After the form on Step 1 is submitted, the application verifies that each piece of data is correct for the given username. If anything is incorrect, or if the username is not recognized, the second page displays a generic error message such as “Sorry, invalid data”. If all submitted data is correct, Step 2 should display at least two of the user’s pre-established personal security questions, along with input fields for the answers. It’s important that the answer fields are part of a single HTML form.&lt;br /&gt;
&lt;br /&gt;
Do not provide a drop-down list for the user to select the questions he wants to answer. Avoid sending the username as a parameter (hidden or otherwise) when the form on this page is submitted. The username should be stored in the server-side session where it can be retrieved as needed.&lt;br /&gt;
&lt;br /&gt;
Because users' security questions / answers generally contains much less entropy than a well-chosen password (how many likely answers are there to the typical &amp;quot;What's your favorite sports team?&amp;quot; or &amp;quot;In what city where you born?&amp;quot; security questions anyway?), make sure you limit the number of guesses attempted and if some threshold is exceeded for that user (say 3 to 5), lock out the user's account for some reasonable duration (say at least 5 minutes) and then challenge the user with some form of challenge token per standard multi-factor workflow; see #3, below) to mitigate attempts by hackers to guess the questions and reset the user's password. (It is not unreasonable to think that a user's email account may have already been compromised, so tokens that do not involve email, such as SMS or a mobile soft-token, are best.)&lt;br /&gt;
&lt;br /&gt;
==  Step 3) Send a Token Over a Side-Channel ==&lt;br /&gt;
&lt;br /&gt;
After step 2, lock out the user's account immediately. Then SMS or utilize some other multi-factor token challenge with a randomly-generated code having 8 or more characters. This introduces an “out-of-band” communication channel and adds defense-in-depth as it is another barrier for a hacker to overcome. If the bad guy has somehow managed to successfully get past steps 1 and 2, he is unlikely to have compromised the side-channel.  It is also a good idea to have the random code which your system generates to only have a limited validity period, say no more than 20 minutes or so. That way if the user doesn't get around to checking their email and their email account is later compromised, the random token used to reset the password would no longer be valid if the user never reset their password and the &amp;quot;reset password&amp;quot; token was discovered by an attacker. Of course, by all means, once a user's password has been reset, the randomly-generated token should no longer be valid.&lt;br /&gt;
&lt;br /&gt;
== Step 4) Allow user to change password in the existing session ==&lt;br /&gt;
&lt;br /&gt;
Step 4 requires input of the code sent in step 3 in the existing session where the challenge questions were answered in step 2, and allows the user to reset his password. Display a simple HTML form with one input field for the code, one for the new password, and one to confirm the new password. Verify the correct code is provided and be sure to enforce all password complexity requirements that exist in other areas of the application. As before, avoid sending the username as a parameter when the form is submitted. Finally, it's critical to have a check to prevent a user from accessing this last step without first completing steps 1 and 2 correctly. Otherwise, a [[forced browsing]] attack may be possible. Ensure the user changes their password and does not simply surf to another page in the application. The reset must be performed before any other operations can be performed by the user.&lt;br /&gt;
&lt;br /&gt;
== Step 5) Logging ==&lt;br /&gt;
&lt;br /&gt;
It is important to keep audit records when password change requests were submitted. This includes whether or not security questions were answered, when reset messages were sent to users and when users utilize them.  It is especially important to log failed attempts to answer security questions and failed attempted use of expired tokens. This data can be used to detect abuse and malicious behavior.  Data such as time, IP address, and browser information can be used to spot trends of suspicious use.&lt;br /&gt;
&lt;br /&gt;
= Other Considerations =&lt;br /&gt;
&lt;br /&gt;
* Whenever a successful password reset occurs, the session should be invalidated and the user redirected to the login page.&lt;br /&gt;
* Strength of questions used for reset should vary based on the nature of the credential. Administrator credentials should have a higher requirement.&lt;br /&gt;
* The ideal implementation should rotate the questions asked in order to avoid automation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Dave Ferguson - gmdavef[at]gmail.com&amp;lt;br/&amp;gt;&lt;br /&gt;
Jim Manico - jim[at]owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
Kevin Wall - kevin.w.wall[at]gmail.com&amp;lt;br/&amp;gt;&lt;br /&gt;
James McGovern - james.mcgovern[at]hp.com&amp;lt;br/&amp;gt;&lt;br /&gt;
Wesley Philip - wphilip[at]ca.ibm.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/VMs&amp;diff=222136</id>
		<title>OWASP Vulnerable Web Applications Directory Project/Pages/VMs</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/VMs&amp;diff=222136"/>
				<updated>2016-10-05T13:49:37Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: Fixed OWASPBWA links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore ]&lt;br /&gt;
| ISO&lt;br /&gt;
| [http://www.badstore.net/register.htm download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/bee-box/ Bee-Box ]&lt;br /&gt;
| bWAPP VMware&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP Broken Web Applications Project]] (BWA) &lt;br /&gt;
&lt;br /&gt;
| VMware, VirtualBox&lt;br /&gt;
| [https://sourceforge.net/projects/owaspbwa/files/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| A collection of vulnerable web apps&lt;br /&gt;
|-&lt;br /&gt;
| [https://bechtsoudis.com/work-stuff/challenges/drunk-admin-web-hacking-challenge/ Drunk Admin Web Hacking Challenge ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://bechtsoudis.com/data/challenges/drunk_admin_hacking_challenge.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/projects/vuln-web-app/ Exploit.co.il Vuln Web App ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/exploitcoilvuln/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/null-gameover/ GameOver ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/null-gameover/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl Hackxor ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/hackxor/files/ download] [http://hackxor.sourceforge.net/cgi-bin/hints.pl hints&amp;amp;amp;tips]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://ninja-sec.com/index.php/hacme-bank-prebuilt-vmware-image-ninja-sec-com/ Hacme Bank Prebuilt&amp;amp;nbsp;VM ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://dc121.4shared.com/download/wwPhUxMQ/hackme_bank_vm_Ninja-Sec.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.kioptrix.com/blog/?p=604 Kioptrix4 ]&lt;br /&gt;
| VMware &amp;amp;amp; Hyper-V&lt;br /&gt;
| [http://www.kioptrix.com/dlvm/Kioptrix4_vmware.rar download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LAMPSecurity ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/files/ download] [http://sourceforge.net/projects/lampsecurity/files/Documentation/ doc]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://blog.metasploit.com/2010/05/introducing-metasploitable.html Metasploitable ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://updates.metasploit.com/data/Metasploitable.zip.torrent download] [http://www.metasploit.com/learn-more/how-do-i-use-it/test-lab.jsp doc]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://community.rapid7.com/docs/DOC-1875 Metasploitable 2 ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [https://sourceforge.net/projects/metasploitable/files/Metasploitable2/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bonsai-sec.com/en/research/moth.php Moth ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/w3af/files/moth/moth/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.pentesterlab.com/exercises/ PentesterLab&amp;amp;nbsp;- The Exercises ]&lt;br /&gt;
| ISO &amp;amp;amp; PDF&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://phdays.blogspot.com.es/2012/05/once-again-about-remote-banking.html PHDays I-Bank ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://downloads.phdays.com/phdays_ibank_vm.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.samurai-wtf.org/ Samurai WTF ]&lt;br /&gt;
| ISO - list&lt;br /&gt;
| [http://sourceforge.net/projects/samurai/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sg6-labs.blogspot.com/2007/12/secgame-1-sauron.html Sauron&amp;amp;nbsp;]&lt;br /&gt;
| Quemu&lt;br /&gt;
| [http://sg6-labs.blogspot.com/search/label/SecGame solutions]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/virtualhacking/ Virtual Hacking Lab ]&lt;br /&gt;
| ZIP&lt;br /&gt;
| [http://sourceforge.net/projects/virtualhacking/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mavensecurity.com/web_security_dojo/ Web Security Dojo ]&lt;br /&gt;
| VMware, VirtualBox&lt;br /&gt;
| [http://sourceforge.net/projects/websecuritydojo/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.ethicalhack3r.co.uk/wordpress-cd/ WordPress CD]&lt;br /&gt;
| VirtualBox&lt;br /&gt;
| [http://www.ethicalhack3r.co.uk/wpcd/WPCD.ova download]&lt;br /&gt;
| ethicalhack3r&lt;br /&gt;
| [http://www.randomstorm.com/wpscan-security-tool.php WPScan]&lt;br /&gt;
|-&lt;br /&gt;
| [http://xxe.sourceforge.net/ XXE ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/xxe/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=208155</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=208155"/>
				<updated>2016-02-04T21:10:13Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: /* January Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are&lt;br /&gt;
 &lt;br /&gt;
Chapter Lead- [mailto:mparsons@parsonsisconsulting.com Matt Parsons]&lt;br /&gt;
&lt;br /&gt;
Hospitality/Facilities Lead- [mailto:rikjones@dcccd.edu Rik Jones]&lt;br /&gt;
&lt;br /&gt;
Web Lead- [mailto:jeromme.lawler@guggenheimpartners.com Jeromme Lawler]&lt;br /&gt;
&lt;br /&gt;
Board Member- [mailto:dsheridan@cigital.com Denis Sheridan]&lt;br /&gt;
&lt;br /&gt;
Board Member- [mailto:steve.horstman@gs.com Steve Horstman]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Announcements  ===&lt;br /&gt;
&lt;br /&gt;
== February Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Wednesday, February 17, 2016 - 5:30 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' DNS Attack Vectors &lt;br /&gt;
&lt;br /&gt;
The DNS is core to how any web property operates. It is unfortunately one of the most overlooked parts of a web site operators infrastructure. This talk is an in-depth view at the potential attacks against the DNS infrastructure with some suggestions for defenses against them. It covers both the authoritative and recursive side of the DNS protocol. We conclude with a brief view at how attackers are now using the DNS to talk to malware C&amp;amp;C and to get data out of the enterprise.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Devasia is a Senior Product Manager in the Cloud Security BU at Akamai Technologies one of the world’s leading providers of in the cloud DDos mitigation. John spent his initial years at Akamai helping large media customers stage some of the biggest media events on the internet. He then transitioned to roles in the security space particularly focused on building products to mitigate DNS based DDos attacks. His current interests revolve around building technology to protect information assets as more and more data flows from end users devices to the cloud services bypassing the corporate perimeter.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 6011 Connection Drive, Irving, TX 75039 - Goldman Sachs. Volunteers will be onsite to escort you from the lobby to the meeting room.&lt;br /&gt;
&lt;br /&gt;
IMPORTANT Meeting Notes:  The Goldman office is a gun-free zone.  Please do not attempt to bring in any guns, holsters, ammo, etc. into their office space.  Also, backpacks, suitcases, and other bags larger than a small purse cannot be brought into the building by guests.&lt;br /&gt;
&lt;br /&gt;
http://meetu.ps/2TfHr9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Previous Meetings  ===&lt;br /&gt;
&lt;br /&gt;
== January Meeting ==&lt;br /&gt;
'''When:''' Tuesday, January 19, 2016 - 5:30 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Bountiful Bugs and DRM Breakage &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dave Ferguson is a Solution Architect at Qualys and has been a specialist in Application Security since 2006. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' 6011 Connection Drive, Irving, TX 75039 - Goldman Sachs. Volunteers will be onsite to escort you from the lobby to the meeting room.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/d/dc/OWASP_Dallas_chapter_January_2016.pdf PDF of Slides]&lt;br /&gt;
&lt;br /&gt;
== November Meeting ==&lt;br /&gt;
'''When:''' Tuesday, November 17th, 2015 from 5:30 PM – ?:?? PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Dallas Happy Hour&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Mexican Sugar at Shops at Legacy - 7501 Lone Star Drive, Suite 8150, Plano, TX&lt;br /&gt;
&lt;br /&gt;
== October Meeting ==&lt;br /&gt;
'''When:''' Wednesday October 7th, 2015 from 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of a Logic Flaw&lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Charles Henderson is the Vice President of Managed Security Testing at Trustwave. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' 6011 Connection Drive, Irving, TX 75039. Volunteers will be onsite to escort you from the lobby to the meeting room.&lt;br /&gt;
&lt;br /&gt;
== September Meeting ==&lt;br /&gt;
'''When:''' Thursday September 17th, 2015 from 5:30PM – 6:30 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Security Trends&lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Stephen Pasco is a Vice President of Application Risk at Goldman Sachs&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 6011 Connection Drive, Irving, TX 75039. Volunteers will be onsite to escort you from the lobby to the meeting room.&lt;br /&gt;
&lt;br /&gt;
== May Meeting ==&lt;br /&gt;
'''When:''' Wednesday May 6, 2015 from 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' The Future of Mobile Payments: Secure Mobile Architecture&lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Denis M. Sheridan is a Managing Consultant at Cigital.  &lt;br /&gt;
&lt;br /&gt;
'''Where:''' North Lake College Central Campus, 5001 North MacArthur Boulevard, Irving, Texas 75038, Room: A-215&lt;br /&gt;
&lt;br /&gt;
== October Meeting ==&lt;br /&gt;
'''When:''' Wednesday October 1, 2014 from 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Succeeding with Enterprise Software Security Key Performance Indicators&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Director, Office of the CISO&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Richland College, 12800 Abrams Road, Dallas, TX 75243, Room: Sabine Hall: SH117 &lt;br /&gt;
&lt;br /&gt;
== March Meeting ==&lt;br /&gt;
'''When:''' Wednesday March 5, 2014 from 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Dallas basic Python tutorial&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Parsons, CISSP MSM&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Richland College, 12800 Abrams Road, Dallas, TX 75243, Room: Sabine Hall: SH117 &lt;br /&gt;
&lt;br /&gt;
== September Meeting ==&lt;br /&gt;
'''When:''' Wednesday September 11, 2013 from 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Mobile Payment Acceptance Security Guidelines for Developers&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ralph Spencer Poore, Director, Emerging Standards at PCI Security Standards Council&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Richland College, 12800 Abrams Road, Dallas, TX 75243, Room: Sabine Hall: SH117 &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:Dallas OWASP 9-11-2013.pdf]]&lt;br /&gt;
&lt;br /&gt;
== May Meeting ==&lt;br /&gt;
'''When:''' Wednesday May 8, 2013 from 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Implementation Patterns for Software Security Programs&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Richland College, 12800 Abrams Road, Dallas, TX 75243, Room: Sabine Hall: SH117 &lt;br /&gt;
&lt;br /&gt;
[http://www.richlandcollege.edu/map/ Map]&lt;br /&gt;
&lt;br /&gt;
== February Meeting ==&lt;br /&gt;
'''When:''' Wednesday February 6, 2013 from 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Webappsec Vulns to Break Censorship&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Robert Hansen, a.k.a. rsnake&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Richland College, 12800 Abrams Road, Dallas, TX 75243, Room: Sabine Hall: SH117 &lt;br /&gt;
&lt;br /&gt;
[http://www.richlandcollege.edu/map/ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=207408</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=207408"/>
				<updated>2016-01-23T18:08:05Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Dave Ferguson.  Currently, I'm a Web Application Security SME at Qualys, Inc.  Previously I worked at at Sabre in Southlake, TX, as a Solutions Architect for Veracode, and a Principal Consultant on the application security team at FishNet Security.  I enjoy writing about application security at [http://appsecnotes.blogspot.com appsecnotes.blogspot.com]. &lt;br /&gt;
&lt;br /&gt;
More detail is on [http://www.linkedin.com/in/davefergusonappsec my LinkedIn profile].&lt;br /&gt;
&lt;br /&gt;
One of my main contributions to OWASP was the [[Forgot Password Cheat Sheet]]. Related to this effort, I was interviewed for [[OWASP Podcast]] #83. Back in 2007 I served as leader of the Kansas City OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
Earlier in my career, I was a Java web application developer, C/C++ programmer, and mechanical engineer.  Feel free to contact me at gmdavef[at]gmail com.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=207407</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=207407"/>
				<updated>2016-01-23T17:55:58Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: /* January Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are&lt;br /&gt;
 &lt;br /&gt;
Chapter Lead- [mailto:mparsons@parsonsisconsulting.com Matt Parsons]&lt;br /&gt;
&lt;br /&gt;
Hospitality/Facilities Lead- [mailto:rikjones@dcccd.edu Rik Jones]&lt;br /&gt;
&lt;br /&gt;
Web Lead- [mailto:jeromme.lawler@guggenheimpartners.com Jeromme Lawler]&lt;br /&gt;
&lt;br /&gt;
Board Member- [mailto:dsheridan@cigital.com Denis Sheridan]&lt;br /&gt;
&lt;br /&gt;
Board Member- [mailto:steve.horstman@gs.com Steve Horstman]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Announcements  ===&lt;br /&gt;
&lt;br /&gt;
== January Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 19, 2016 - 5:30 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Bountiful Bugs and DRM Breakage &lt;br /&gt;
&lt;br /&gt;
From cash awards to airline miles, bug bounty programs seem to be everywhere these days. Dave shares his experiences being part of a global bug hunting team. Rules of engagement, the reporting process, team dynamics, payout structure, and some super interesting security bugs will be discussed. As a special bonus, he will dig into some techniques and tools used to break DRM systems that are supposed to protect the contents of eBooks sold by online retailers.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dave Ferguson has been a specialist in Application Security since 2006. After writing tons of Java and C++ code for over a decade, he pen tested countless applications and trained developers as a consultant. He has served as the Application Security Lead at Sabre and is currently an AppSec SME at Qualys. Dave holds CISSP and CSSLP certifications and is primary author of the OWASP Forgot Password Cheat Sheet.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 6011 Connection Drive, Irving, TX 75039 - Goldman Sachs. Volunteers will be onsite to escort you from the lobby to the meeting room.&lt;br /&gt;
&lt;br /&gt;
http://meetu.ps/2RnYL1&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/d/dc/OWASP_Dallas_chapter_January_2016.pdf PDF of Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Previous Meetings  ===&lt;br /&gt;
&lt;br /&gt;
== November Meeting ==&lt;br /&gt;
'''When:''' Tuesday, November 17th, 2015 from 5:30 PM – ?:?? PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Dallas Happy Hour&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Mexican Sugar at Shops at Legacy - 7501 Lone Star Drive, Suite 8150, Plano, TX&lt;br /&gt;
&lt;br /&gt;
== October Meeting ==&lt;br /&gt;
'''When:''' Wednesday October 7th, 2015 from 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of a Logic Flaw&lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Charles Henderson is the Vice President of Managed Security Testing at Trustwave. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' 6011 Connection Drive, Irving, TX 75039. Volunteers will be onsite to escort you from the lobby to the meeting room.&lt;br /&gt;
&lt;br /&gt;
== September Meeting ==&lt;br /&gt;
'''When:''' Thursday September 17th, 2015 from 5:30PM – 6:30 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Security Trends&lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Stephen Pasco is a Vice President of Application Risk at Goldman Sachs&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 6011 Connection Drive, Irving, TX 75039. Volunteers will be onsite to escort you from the lobby to the meeting room.&lt;br /&gt;
&lt;br /&gt;
== May Meeting ==&lt;br /&gt;
'''When:''' Wednesday May 6, 2015 from 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' The Future of Mobile Payments: Secure Mobile Architecture&lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Denis M. Sheridan is a Managing Consultant at Cigital.  &lt;br /&gt;
&lt;br /&gt;
'''Where:''' North Lake College Central Campus, 5001 North MacArthur Boulevard, Irving, Texas 75038, Room: A-215&lt;br /&gt;
&lt;br /&gt;
== October Meeting ==&lt;br /&gt;
'''When:''' Wednesday October 1, 2014 from 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Succeeding with Enterprise Software Security Key Performance Indicators&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Director, Office of the CISO&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Richland College, 12800 Abrams Road, Dallas, TX 75243, Room: Sabine Hall: SH117 &lt;br /&gt;
&lt;br /&gt;
== March Meeting ==&lt;br /&gt;
'''When:''' Wednesday March 5, 2014 from 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Dallas basic Python tutorial&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Parsons, CISSP MSM&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Richland College, 12800 Abrams Road, Dallas, TX 75243, Room: Sabine Hall: SH117 &lt;br /&gt;
&lt;br /&gt;
== September Meeting ==&lt;br /&gt;
'''When:''' Wednesday September 11, 2013 from 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Mobile Payment Acceptance Security Guidelines for Developers&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ralph Spencer Poore, Director, Emerging Standards at PCI Security Standards Council&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Richland College, 12800 Abrams Road, Dallas, TX 75243, Room: Sabine Hall: SH117 &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:Dallas OWASP 9-11-2013.pdf]]&lt;br /&gt;
&lt;br /&gt;
== May Meeting ==&lt;br /&gt;
'''When:''' Wednesday May 8, 2013 from 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Implementation Patterns for Software Security Programs&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Richland College, 12800 Abrams Road, Dallas, TX 75243, Room: Sabine Hall: SH117 &lt;br /&gt;
&lt;br /&gt;
[http://www.richlandcollege.edu/map/ Map]&lt;br /&gt;
&lt;br /&gt;
== February Meeting ==&lt;br /&gt;
'''When:''' Wednesday February 6, 2013 from 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Webappsec Vulns to Break Censorship&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Robert Hansen, a.k.a. rsnake&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Richland College, 12800 Abrams Road, Dallas, TX 75243, Room: Sabine Hall: SH117 &lt;br /&gt;
&lt;br /&gt;
[http://www.richlandcollege.edu/map/ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Dallas_chapter_January_2016.pdf&amp;diff=207406</id>
		<title>File:OWASP Dallas chapter January 2016.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Dallas_chapter_January_2016.pdf&amp;diff=207406"/>
				<updated>2016-01-23T17:48:10Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=168633</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=168633"/>
				<updated>2014-02-20T19:59:21Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Dave Ferguson.  I am currently a Sr. Principal in Application Security at Sabre, Inc. in Southlake, TX.  Previously, I worked as a Solutions Architect for Veracode and a Principal Consultant on the application security team at FishNet Security.  I enjoy writing about application security at [http://appsecnotes.blogspot.com appsecnotes.blogspot.com] and also writing for [http://www.checkmarx.com Checkmarx] from time to time. &lt;br /&gt;
&lt;br /&gt;
More detail is on [http://www.linkedin.com/in/davefergusonappsec my LinkedIn profile].&lt;br /&gt;
&lt;br /&gt;
One of my main contributions to OWASP was the [[Forgot Password Cheat Sheet]]. Related to this effort, I was interviewed for [[OWASP Podcast]] #83. Back in 2007 I served as leader of the Kansas City OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
Earlier in my career, I was a Java web application developer, C/C++ programmer, and mechanical engineer.  Feel free to contact me at gmdavef[at]gmail com.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=168632</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=168632"/>
				<updated>2014-02-20T19:56:59Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Dave Ferguson.  I am currently a Sr. Principal in Application Security at Sabre, Inc. in Southlake, TX.  Previously, I worked as a Solutions Architect for Veracode and a Principal Consultant on the application security team at FishNet Security.  I enjoy writing about application security at [http://appsecnotes.blogspot.com appsecnotes.blogspot.com] and also writing for [http://www.checkmarx.com Checkmarx] from time to time. &lt;br /&gt;
&lt;br /&gt;
More detail is on [http://www.linkedin.com/in/davefergusonappsec my LinkedIn profile].&lt;br /&gt;
&lt;br /&gt;
I'm also a former chapter leader of OWASP's Kansas City chapter.  One of my main contributions to OWASP was the [[Forgot Password Cheat Sheet]]. Related to this effort, I was interviewed for [[OWASP Podcast]] #83. &lt;br /&gt;
&lt;br /&gt;
Earlier in my career, I was a Java web application developer, C/C++ programmer, and mechanical engineer.  Feel free to contact me at gmdavef[at]gmail com.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=157018</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=157018"/>
				<updated>2013-08-19T20:48:05Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Dave Ferguson.  I am currently a Sr. Principal in Application Security at Sabre Holdings in Dallas, TX.  Previously, I worked as a Solutions Architect for Veracode and a Principal Consultant on the application security team at FishNet Security.  &lt;br /&gt;
&lt;br /&gt;
More detail is on [http://www.linkedin.com/in/davefergusonappsec my LinkedIn profile].&lt;br /&gt;
&lt;br /&gt;
I'm also a former chapter leader of OWASP's Kansas City chapter.  One of my main contributions to OWASP was the [[Forgot Password Cheat Sheet]]. Related to this effort, I was interviewed for [[OWASP Podcast]] #83. Earlier in my career, I was a Java web application developer, C/C++ programmer, and mechanical engineer.  Feel free to contact me at gmdavef[at]gmail com.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_January_2013&amp;diff=150499</id>
		<title>Denver January 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_January_2013&amp;diff=150499"/>
				<updated>2013-04-25T22:40:14Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Speaker: [[User:Owaspdavef|Dave Ferguson]] from Veracode&lt;br /&gt;
&lt;br /&gt;
Topic: Tips for Building a Successful Application Security Program ([[Media:OWASP_Denver_2013-01-16.pdf|download]])&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Denver_2013-01-16.pdf&amp;diff=150498</id>
		<title>File:OWASP Denver 2013-01-16.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Denver_2013-01-16.pdf&amp;diff=150498"/>
				<updated>2013-04-25T22:19:12Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: Slides from Dave Ferguson's talk at the OWASP Denver meeting on Jan. 16, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slides from Dave Ferguson's talk at the OWASP Denver meeting on Jan. 16, 2013.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=150497</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=150497"/>
				<updated>2013-04-25T22:09:27Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=Chapter leader is Steve Kosten.   |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
===THANK YOU TO OUR SPONSORS===&lt;br /&gt;
[[File:DenverCateringSponsor2013SouthSeas.jpg]]&lt;br /&gt;
&lt;br /&gt;
A big thank you to [http://www.southseascorp.com/ South Seas Corporation] for sponsoring all catering for our 2013 monthly chapter meetings!!  It is much appreciated!&lt;br /&gt;
&lt;br /&gt;
===Next Chapter Meeting: April 17th at CCA Lowery  [ http://1304denverowasp.eventbrite.com/#    RSVP Now!!! ] ===&lt;br /&gt;
&lt;br /&gt;
Food and Chapter Business starting at 6, presentation starting at about 6:30.&lt;br /&gt;
&lt;br /&gt;
[ http://1304denverowasp.eventbrite.com/# RSVP]&lt;br /&gt;
&lt;br /&gt;
'''Topic: Security in the SDLC'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This month we welcome Matt Shufeldt who will be presenting on security in the SDLC looking at different models and what has worked and not worked.   Matt is the Director of Information Security at Sports Authority and we look forward to hearing of his lessons learned!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the chapter:'''&lt;br /&gt;
Chapter Meetings are held the 3rd Wednesday of designated months for the Denver Chapter, and the 3rd Thursday of designated months for the [[Boulder|Boulder]] Chapter.  If you have an idea for a topic or speaker or would like to present, please&lt;br /&gt;
reach out to Steve Kosten, Denver OWASP Chapter Leader: steve 'dot' kosten 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- June 20th at 6'ish at Hosting.  [http://www.eventbrite.com/org/371792456    RSVP HERE ] so we can order the right # of pizzas --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Thanks to [http://www.ccaurora.edu/ Community College Aurora ] for hosting us, [http://www.southseascorp.com/ South Seas Corporation] for providing food for our meetings and thanks to [http://veracode.com Veracode] for providing a speaker for this meeting...'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Future meetings are planned for: stay tuned for 2013.&lt;br /&gt;
&lt;br /&gt;
==Chapter Board of Directors==&lt;br /&gt;
Here's the team that's putting it all together:&lt;br /&gt;
* Chairman/Chapter Leader - Steve Kosten&lt;br /&gt;
* Director of Communications - Craig Klosterman&lt;br /&gt;
* Comm Vice-Director - Alan Darien&lt;br /&gt;
* Outreach &amp;amp; Education Chair - James Synovec&lt;br /&gt;
* Outreach &amp;amp; Education Vice Chair - Brad Carvalho&lt;br /&gt;
* FROC Chair - Micah Tapman&lt;br /&gt;
* FROC Chair Emeritus - Kathy Thaxton&lt;br /&gt;
&lt;br /&gt;
NOTE: PLEASE CONSIDER FOLLOWING US AT @OWASP303 ON TWITTER AND/OR [http://lists.owasp.org/mailman/listinfo/owasp-denver SUBSCRIBE TO THE MAILING LIST] AND/OR join the OWASP Denver Linked In group.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =====Missed the con?=====&lt;br /&gt;
* [http://www.reddit.com/r/netsec/comments/fgetw/shmoocon_2011_video_collection/ Vids from Schmoocon 2011]&lt;br /&gt;
* [http://media.ccc.de/browse/congress/2010/index.html Vids from 27c3]&lt;br /&gt;
* [http://vimeo.com/groups/asdc10/videos/sort:newest Vids from AppsecDC 2010]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Podcast=====&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Podcast OWASP Podcast]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =====Wassup Boulder=====&lt;br /&gt;
Boulder has built a strong chapter over the past 2 years.  Any individuals up north of Denver have a great resource.  We hope to share some resources and communication with the Boulder chapter.  If you're interested in meeting with the Boulder chapter please let us know!  &lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Questions, Comments==&lt;br /&gt;
Questions can be directed to &lt;br /&gt;
&lt;br /&gt;
*Steve Kosten, Denver OWASP: steve 'dot' kosten 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Meetings are usually the 3rd Wednesday of the month.  We are trying to have at least 2/quarter.  If you can't make the Denver meeting, the [[Boulder|Boulder]] meeting is usually the 3rd Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
&lt;br /&gt;
Meetings are planned for the 3rd Wednesdays of September and October.  We may do a social event or two also...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 5 March 28 2013: SnowFROC 2013  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
[[Denver_April_2013|Matt Schufeldt: &amp;quot;Security in the SDLC&amp;quot;]]&lt;br /&gt;
&lt;br /&gt;
[[Denver_March_2013|Jim Manico: &amp;quot;Secure Coding Techniques&amp;quot;]]&lt;br /&gt;
&lt;br /&gt;
[[Denver_February_2013|Chris Roberts: &amp;quot;The Evolution of Hacking&amp;quot;]]&lt;br /&gt;
&lt;br /&gt;
[[Denver_January_2013|Dave Ferguson: &amp;quot;Building a Successful Application Security Program&amp;quot;]]&lt;br /&gt;
&lt;br /&gt;
[[Denver_June_2012|Laz: Emerging Threats]]&lt;br /&gt;
&lt;br /&gt;
[[Denver May 2012 meeting|Steve Kosten: XSS hands-on]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2012 meeting|April 18th 2012: Tim Van Cleave &amp;quot;Intro to WebScarab and WebGoat&amp;quot;]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2012 meeting|February 15th 2012: Andy Lewis &amp;quot;Why OWASP? OWASP is the wheel. You don't need to reinvent it!]]&lt;br /&gt;
&lt;br /&gt;
Denver January 2012 meeting January 18th, 2012| Greg Knaddison [http://2011.badcamp.net/program/sessions/how-does-drupal-security-stack &amp;quot;How Does Drupal Security Stack up?&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
[[Denver September 2011 meeting|September 14th 2011: Chris Schmidt &amp;quot;OWASP ESAPI&amp;quot;]]&lt;br /&gt;
&lt;br /&gt;
[[Denver March 2011 meeting|March 17th 2011: Hands on &amp;quot;Hack a Thon&amp;quot;]]&lt;br /&gt;
&lt;br /&gt;
[[Denver September 2010 meeting|September 22nd 2010: Eric Duprey: Application Vulnerability Shooting Gallery]]&lt;br /&gt;
&lt;br /&gt;
[[Denver August 2010 meeting|August 18th 2010: Clint Pollock: Protecting Your Applications from Backdoors]]&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2010|June 2nd 2010: Front Range OWASP Conference]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2010 meeting|January 20th 2010: John Evans: Securing Webapps: An Illustrative Overview]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2009 meeting|November 18th 2009: Anton Rager: Advanced XSS]]&lt;br /&gt;
&lt;br /&gt;
[[Denver August 2009 meeting|August 27th 2009: Jon Rose: Security in the Clouds]]&lt;br /&gt;
&lt;br /&gt;
[[Denver May 2009 meeting|May 2009: Dr. Joseph McComb &amp;amp; and Daniel Weiske: Compliance and application security testing]]&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009|March 2009: Front Range OWASP Conference (SnowFROC)]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2009 meeting|January 2009: David Campbell &amp;amp; Eric Duprey: Guided Tour: AppSec NYC '08 CTF]]&lt;br /&gt;
&lt;br /&gt;
[[Denver October 2008 meeting|October 2008: Alex Smolen: The OWASP ASP .NET ESAPI]]&lt;br /&gt;
&lt;br /&gt;
[[Denver September 2008 meeting|September 2008: John Dickson: Black Box vs. White Box: Different App Testing Strategies]]&lt;br /&gt;
&lt;br /&gt;
[[Denver August 2008 meeting|August 2008: Dan Cornell: Static Analysis]]&lt;br /&gt;
&lt;br /&gt;
[[Denver July 2008 meeting|July 2008: David Byrne &amp;amp; Eric Duprey: Grendel-Scan]]&lt;br /&gt;
&lt;br /&gt;
[[Front Range OWASP Conference|June 2008: Front Range OWASP Conference: Jeremiah Grossman, Robert Hansen, and more!]]&lt;br /&gt;
&lt;br /&gt;
[[Denver May 2008 meeting|May 2008: David Campbell &amp;amp; Eric Duprey: XSS Attacks &amp;amp; Defenses]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2008 meeting|April 2008: Ryan Barnett: Virtual Patching with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2008 meeting|February 2008: Michael Sutton: SQL Injection Revisited]]&lt;br /&gt;
&lt;br /&gt;
[[Denver June 2007 meeting|June 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;br /&gt;
&lt;br /&gt;
==[[Related_Organizations|Local Organizations of Interest]]==&lt;br /&gt;
&lt;br /&gt;
==== Mailing List ====&lt;br /&gt;
Join the [http://lists.owasp.org/mailman/listinfo/owasp-denver OWASP Denver Mailing List] to receive meeting notifications via email&lt;br /&gt;
&lt;br /&gt;
==== Twitter Feed @owasp303 ====&lt;br /&gt;
Denver OWASP has created a [http://twitter.com/owasp303 Twitter feed @owasp303] to keep you in the loop.  Whilst the mailing list is primarily intended to be low-traffic and only provide updates regarding the times, locations, and topics for chapter meetings, the Twitter feed will also provide noteworthy appsec updates.&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
&amp;lt;twitter&amp;gt;55021150&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Resources====&lt;br /&gt;
&lt;br /&gt;
=====Denver OWASP Chapter Leaders=====&lt;br /&gt;
*Steve Kosten, Denver OWASP: steve.kosten 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
=====Key OWASP Resources=====&lt;br /&gt;
* http://www.owasp.org/images/4/41/ASVS_One_Page_Handout.pdf&lt;br /&gt;
* http://www.owasp.org/images/3/31/ESAPI_One_Page_Handout.pdf&lt;br /&gt;
* http://www.owasp.org/images/a/a1/Legal_One_Page_Handout.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/a/a3/How_ESAPI_Works.pdf&lt;br /&gt;
* http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf&lt;br /&gt;
* http://www.owasp.org/images/0/01/Getting_started_designing_for_a_level_of_assurance.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories&lt;br /&gt;
* http://www.owasp.org/index.php/Man_vs._Code&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/4/4e/OWASP_ASVS_2009_Web_App_Std_Release.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/c/cd/PHP-ESAPI_1.0a_install.pdf&lt;br /&gt;
* http://www.owasp.org/images/6/67/PHP-ESAPI_1.0a_ReleaseNotes.pdf&lt;br /&gt;
&lt;br /&gt;
=====Chapter Management Links=====&lt;br /&gt;
&amp;lt;!-- [[Pizza|Best pizza in Centennial]] --&amp;gt;&lt;br /&gt;
[[Chapter SOPs|Denver OWASP Chapter SOPs]]&lt;br /&gt;
&lt;br /&gt;
[[FROC Schedule|SnowFROC 2013 ]]&lt;br /&gt;
* http://www.meetup.com/Denver-OWASP/&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Colorado]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_January_2013&amp;diff=150496</id>
		<title>Denver January 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_January_2013&amp;diff=150496"/>
				<updated>2013-04-25T22:08:02Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: Created page with &amp;quot;Speaker: Dave Ferguson from Veracode  Topic: Tips for Building a Successful Application Security Program&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Speaker: [[User:Owaspdavef|Dave Ferguson]] from Veracode&lt;br /&gt;
&lt;br /&gt;
Topic: Tips for Building a Successful Application Security Program&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Forgot_Password_Cheat_Sheet&amp;diff=135354</id>
		<title>Forgot Password Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Forgot_Password_Cheat_Sheet&amp;diff=135354"/>
				<updated>2012-09-05T15:05:24Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: Fixed link to white paper.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Introduction  =&lt;br /&gt;
&lt;br /&gt;
This article provides a simple model to follow when implementing a &amp;amp;quot;forgot password&amp;amp;quot; web application feature.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= The Problem =&lt;br /&gt;
&lt;br /&gt;
There is no industry standard for implementing a Forgot Password feature. The result is that you see applications forcing users to jump through myriad hoops involving emails, special URLs, temporary passwords, personal security questions, and so on. With some applications you can recover your existing password. In others you have to reset it to a new value.&lt;br /&gt;
&lt;br /&gt;
The recommendations presented here for implementing Forgot Password are most appropriate for organizations that have a business relationship with users. Web applications that target the general public (social networking, free email sites, etc.) are fundamentally different and some concepts presented may not be feasible in those situations.&lt;br /&gt;
&lt;br /&gt;
= Steps  =&lt;br /&gt;
&lt;br /&gt;
== Step 1) Gather Identity Data ==&lt;br /&gt;
&lt;br /&gt;
The first page of a secure Forgot Password feature asks the user for multiple pieces of hard data. A single HTML form should be used for all of the inputs.&lt;br /&gt;
&lt;br /&gt;
A minimum of three inputs is recommended, but the more you require, the more secure it will be. One of the inputs, preferably listed first, should be the email address. Others can be selected depending on the nature of the data available to the application. Examples include:&lt;br /&gt;
&lt;br /&gt;
* email address&lt;br /&gt;
* last name&lt;br /&gt;
* date of birth&lt;br /&gt;
* account number&lt;br /&gt;
* customer number&lt;br /&gt;
* social security number&lt;br /&gt;
* zip code for address on file&lt;br /&gt;
* street number for address on file&lt;br /&gt;
&lt;br /&gt;
For enhanced security, you may wish to consider asking the user for their email address first and then send an email that takes them to a private page that requests the other 2 (or more) identity factors. That way the email itself isn’t that useful because they still have to answer a bunch of ‘secret’ questions after they get to the landing page.&lt;br /&gt;
&lt;br /&gt;
== Step 2) Verify Security Questions ==&lt;br /&gt;
&lt;br /&gt;
After the form on Step 1 is submitted, the application verifies that each piece of data is correct for the given username. If anything is incorrect, or if the username is not recognized, the second page displays a generic error message such as “Sorry, invalid data”. If all submitted data is correct, Step 2 should display at least two of the user’s pre-established personal security questions, along with input fields for the answers. It’s important that the answer fields are part of a single HTML form.&lt;br /&gt;
&lt;br /&gt;
Do not provide a drop-down list for the user to select the questions he wants to answer. Avoid sending the username as a parameter (hidden or otherwise) when the form on this page is submitted. The username should be stored in the server-side session where it can be retrieved as needed.&lt;br /&gt;
&lt;br /&gt;
==  Step 3) Send a Token Over a Side-Channel ==&lt;br /&gt;
&lt;br /&gt;
After step 2, email or SMS the user a randomly-generated code having 8 or more characters. This introduces an “out of band” communication channel and would be extremely tough for a hacker to overcome. If the bad guy has somehow managed to successfully get past steps 1 and 2, he is unlikely to have compromised the side channel. &lt;br /&gt;
&lt;br /&gt;
== Step 4) Allow user to change password ==&lt;br /&gt;
&lt;br /&gt;
Step 4 requires input of the code sent in step 3 and allows the user to reset his password.  Display a simple HTML form with one input field for the code, one for the new password, and one to confirm the new password. Verify the correct code is provided and be sure to enforce all password complexity requirements that exist in other areas of the application. As before, avoid sending the username as a parameter when the form is submitted.  Finally, it's critical to have a check to prevent a user from accessing this last step without first completing steps 1 and 2 correctly.  Otherwise, a [[forced browsing]] attack may be possible.&lt;br /&gt;
&lt;br /&gt;
= Related Articles  =&lt;br /&gt;
&lt;br /&gt;
FishNet Security White Paper - [http://www.fishnetsecurity.com/sites/default/files/media/10WP0003_BestPractices_SecureForgotPassword%5B1%5D_0.pdf Best Practices for a Secure &amp;amp;quot;Forgot Password&amp;amp;quot; Feature] &lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Dave Ferguson - gmdavef[at]gmail com&amp;lt;br/&amp;gt;&lt;br /&gt;
Jim Manico - jim[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=132934</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=132934"/>
				<updated>2012-07-12T15:57:37Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Dave Ferguson.  I am currently a Solutions Architect at Veracode in Dallas, TX, USA.  Prior to that I was a Principal Consultant on the application security team at FishNet Security.  More detail is on [http://www.linkedin.com/in/davefergusonappsec my LinkedIn profile].&lt;br /&gt;
&lt;br /&gt;
I am a former chapter leader of OWASP's Kansas City chapter.  One of my main contributions to OWASP was the [[Forgot Password Cheat Sheet]]. Related to this effort, I was interviewed for [[OWASP Podcast]] #83. Earlier in my career, I was a Java web application developer, C/C++ programmer, and mechanical engineer.  Feel free to contact me at gmdavef[at]gmail com.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=132933</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=132933"/>
				<updated>2012-07-12T15:24:18Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Dave Ferguson.  I am currently a Solutions Architect at Veracode and prior to that was a Principal Consultant on the application security team at FishNet Security in Dallas, TX, USA.  More detail is on [http://www.linkedin.com/in/davefergusonappsec my LinkedIn profile].&lt;br /&gt;
&lt;br /&gt;
I am a former chapter leader for OWASP's Kansas City chapter.  One of my main contributions to OWASP was the [[Forgot Password Cheat Sheet]]. Earlier in my career, I was a Java web application developer, C/C++ programmer, and mechanical engineer.  Feel free to contact me at gmdavef[at]gmail com.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Forgot_Password_Cheat_Sheet&amp;diff=128936</id>
		<title>Forgot Password Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Forgot_Password_Cheat_Sheet&amp;diff=128936"/>
				<updated>2012-05-02T14:43:20Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Introduction  =&lt;br /&gt;
&lt;br /&gt;
This article provides a simple model to follow when implementing a &amp;amp;quot;forgot password&amp;amp;quot; web application feature.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= The Problem =&lt;br /&gt;
&lt;br /&gt;
There is no industry standard for implementing a Forgot Password feature. The result is that you see applications forcing users to jump through myriad hoops involving emails, special URLs, temporary passwords, personal security questions, and so on. With some applications you can recover your existing password. In others you have to reset it to a new value.&lt;br /&gt;
&lt;br /&gt;
The recommendations presented here for implementing Forgot Password are most appropriate for organizations that have a business relationship with users. Web applications that target the general public (social networking, free email sites, etc.) are fundamentally different and some concepts presented may not be feasible in those situations.&lt;br /&gt;
&lt;br /&gt;
= Steps  =&lt;br /&gt;
&lt;br /&gt;
== Step 1) Gather Identity Data ==&lt;br /&gt;
&lt;br /&gt;
The first page of a secure Forgot Password feature asks the user for multiple pieces of hard data. A single HTML form should be used for all of the inputs.&lt;br /&gt;
&lt;br /&gt;
A minimum of three inputs is recommended, but the more you require, the more secure it will be. One of the inputs, preferably listed first, should be the email address. Others can be selected depending on the nature of the data available to the application. Examples include:&lt;br /&gt;
&lt;br /&gt;
* email address&lt;br /&gt;
* last name&lt;br /&gt;
* date of birth&lt;br /&gt;
* account number&lt;br /&gt;
* customer number&lt;br /&gt;
* social security number&lt;br /&gt;
* zip code for address on file&lt;br /&gt;
* street number for address on file&lt;br /&gt;
&lt;br /&gt;
For enhanced security, you may wish to consider asking the user for their email address first and then send an email that takes them to a private page that requests the other 2 (or more) identity factors. That way the email itself isn’t that useful because they still have to answer a bunch of ‘secret’ questions after they get to the landing page.&lt;br /&gt;
&lt;br /&gt;
== Step 2) Verify Security Questions ==&lt;br /&gt;
&lt;br /&gt;
After the form on Step 1 is submitted, the application verifies that each piece of data is correct for the given username. If anything is incorrect, or if the username is not recognized, the second page displays a generic error message such as “Sorry, invalid data”. If all submitted data is correct, Step 2 should display at least two of the user’s pre-established personal security questions, along with input fields for the answers. It’s important that the answer fields are part of a single HTML form.&lt;br /&gt;
&lt;br /&gt;
Do not provide a drop-down list for the user to select the questions he wants to answer. Avoid sending the username as a parameter (hidden or otherwise) when the form on this page is submitted. The username should be stored in the server-side session where it can be retrieved as needed.&lt;br /&gt;
&lt;br /&gt;
==  Step 3) Send a Token Over a Side-Channel ==&lt;br /&gt;
&lt;br /&gt;
After step 2, email or SMS the user a randomly-generated code having 8 or more characters. This introduces an “out of band” communication channel and would be extremely tough for a hacker to overcome. If the bad guy has somehow managed to successfully get past steps 1 and 2, he is unlikely to have compromised the side channel. &lt;br /&gt;
&lt;br /&gt;
== Step 4) Allow user to change password ==&lt;br /&gt;
&lt;br /&gt;
Step 4 requires input of the code sent in step 3 and allows the user to reset his password.  Display a simple HTML form with one input field for the code, one for the new password, and one to confirm the new password. Verify the correct code is provided and be sure to enforce all password complexity requirements that exist in other areas of the application. As before, avoid sending the username as a parameter when the form is submitted.  Finally, it's critical to have a check to prevent a user from accessing this last step without first completing steps 1 and 2 correctly.  Otherwise, a [[forced browsing]] attack may be possible.&lt;br /&gt;
&lt;br /&gt;
= Related Articles  =&lt;br /&gt;
&lt;br /&gt;
FishNet Security White Paper - [http://www.fishnetsecurity.com/Resource_/PageResource/White_Papers/FishNetSecurity_SecureForgotPassword.pdf Best Practices for a Secure &amp;amp;quot;Forgot Password&amp;amp;quot; Feature] &lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Dave Ferguson - gmdavef[at]gmail com&amp;lt;br/&amp;gt;&lt;br /&gt;
Jim Manico - jim[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=128161</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=128161"/>
				<updated>2012-04-19T18:48:23Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Dave Ferguson.  I am currently a Solutions Architect at Veracode and former Principal Consultant on the application security team at FishNet Security in Dallas, TX, USA.  I am a former chapter leader for OWASP's Kansas City chapter.  Earlier in my career, I was a Java web application developer, C/C++ programmer, and mechanical engineer.  Feel free to contact me at gmdavef[at]gmail com.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=128160</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=128160"/>
				<updated>2012-04-19T18:47:36Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Dave Ferguson.  I am currently a Solutions Architect at Veracode and former Principal Consultant at FishNet Security in Dallas, TX, USA.  I am a former chapter leader for OWASP's Kansas City chapter.  Earlier in my career, I was a Java web application developer, C/C++ programmer, and mechanical engineer.  Feel free to contact me at gmdavef[at]gmail com.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Podcast&amp;diff=117420</id>
		<title>OWASP Podcast</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Podcast&amp;diff=117420"/>
				<updated>2011-09-15T19:03:18Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
&lt;br /&gt;
'''OWASP Podcast Series Hosted by Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
* The OWASP foundation presents the OWASP PODCAST SERIES hosted and produced by [mailto:jim@owasp.org Jim Manico].&lt;br /&gt;
* Listen as Jim interviews OWASP volunteers, industry experts and leaders within the field of web application security. &lt;br /&gt;
* Questions? Comments? Please email [mailto:podcast@owasp.org podcast@owasp.org]&lt;br /&gt;
* Care to join our email list? Sign up here [https://lists.owasp.org/mailman/listinfo/owasp-podcast https://lists.owasp.org/mailman/listinfo/owasp-podcast]&lt;br /&gt;
* Want to see the process and equipment behind the show? [https://www.owasp.org/index.php/Talk:OWASP_Podcast click here] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
[http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=300769012 https://www.owasp.org/download/jmanico/OWASP_Podcast_200x200.jpg]&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot;&amp;gt;&lt;br /&gt;
Subscribe&amp;lt;br/&amp;gt;[http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=300769012 https://www.owasp.org/download/jmanico/itunes.jpg] [https://www.owasp.org/download/jmanico/podcast.xml https://www.owasp.org/images/d/d3/Feed-icon-32x32.png]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Podcast&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Latest Shows====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;#&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Date&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Actions&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;87&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;July 20, 2011&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_87.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;John Heimann (Oracle)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;**&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;July 16, 2011&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.appsecusa.org/owasp_foundation_2011_board_candidate_interviews.mp3 Listen Now] &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Dave Wichers, Sebastien Deleersnyder, Michael Coates, Christian Heinrich ([https://www.owasp.org/index.php/Membership/2011Election 2012 OWASP Election Candidates]) &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;86&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;July 7, 2011&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_86.mp3 Listen Now] | [[OWASP_Podcast/Transcripts/086|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Kevin Mahaffey, Jack Mannino and Chris Wysopal (Mobile Security)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;85&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;June 22, 2011&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_85.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Ken van Wyk (iGoat)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;84&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;May 10, 2011&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_84.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Alex Behar (DDoS Mitigation)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;83&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 19, 2011&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_83.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[[User:Owaspdavef|Dave Ferguson]] (Forgot Password)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;82&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 7, 2011&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_82.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[[User:Wichers|Dave Wichers]] [[OWASP_Board_Meetings | (OWASP Board Member)]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;81&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;January 8, 2011&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_81.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Brian Chess (Non-SaaS Static Analysis)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;80&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;December 11, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_80.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Chris Wysopal (SaaS Static Analysis)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;79&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;November 27, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_79.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Tony UV (Threat Modeling)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;78&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;October 13, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_78.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;AppSec Roundtable with Jeff Williams, Andrew van der Stock, Tom Brennan, Samy, Jeremiah Grossman and Jim Manico (Complete Chaos)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;77&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;October 13, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_77.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Rafal Los&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;76&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;September 22, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_76.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Bill Cheswick (Account Lockout)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;75&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;September 15, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_75.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Brandon Sterne (Content Security Policy)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;74&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;September 2, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_74.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Eoin Keary (Code Review)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;73&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;June 30, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_73.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Jeremiah Grossman and Robert Hansen&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;72&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;June 25, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_72.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Ivan Ristic (WAF)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;71&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 19, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_71.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[[Top_10_2010|Top Ten]] with Robert Hansen [[Top_10_2010-A10|(Redirects)]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;70&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 19, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_70.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[[Top_10_2010|Top Ten]] with Michael Coates [[Top_10_2010-A9|(TLS)]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;69&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 19, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_69.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[[Top_10_2010|Top Ten]] with Eric Sheridan [[Top_10_2010-A5|(CSRF)]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;68&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 19, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_68.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[[Top_10_2010|Top Ten]] with Kevin Kenan [[Top_10_2010-A7|(Cryptographic Storage)]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;67&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 19, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_67.mp3 Listen Now] | [[OWASP_Podcast/Transcripts/067|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[[Top_10_2010|Top Ten]] with Jeff Williams [[Top_10_2010-A2|(XSS)]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;66&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 14, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_66.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Brad Arkin (Adobe)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;65&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 13, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_65.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;AppSec Roundtable with Boaz Gelbord, Dan Cornell, Jeff Williams, Johannes Ullrich and Jim Manico (File Upload)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;64&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 30, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_64.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Andy Ellis (Availability)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;63&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 17, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_63.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Ed Bellis (eCommerce)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;62&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 12, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_62.mp3 Listen Now] | [[Podcast_62|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Amichai Shulman (WAF)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;61&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 10, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_61.mp3 Listen Now] | [[Podcast_61|Show Notes]] | [[OWASP_Podcast/Transcripts/067|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Richard Bejtlich (Network Monitoring)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;60&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 5, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_60.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Jeremiah Grossman and Robert Hansen (Google pays for vulns)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;59&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 3, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_59.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;AppSec Roundtable with Boaz Gelbord, Ben Tomhave, Dan Cornell, Jeff Williams, Andrew van der Stock and Jim Manico (Aurora+)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;58&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 2, 2010&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_58.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Ron Gula (Web Server Scanning, IDS/IPS)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;57&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;December 21, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_57.mp3 Listen Now] | [[Podcast_57|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with David Linthicum (Cloud Computing)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;56&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;December 7, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_56.mp3 Listen Now] | [[Podcast_56|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Adar Weidman (Regular Expression DOS)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;55&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;November 26, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_55.mp3 Listen Now] | [[Podcast_55|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;AppSec Roundtable with Boaz Gelbord, Jason Lam, Jim Manico and Jeff Williams (AppSec Justification)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;54&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;November 24, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_54.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with George Hesse (German Chapter Leader)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;53&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;November 24, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_53.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Amichai Shulman (WAF)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;52&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;November 5, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_52.mp3 Listen Now]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Sandro Gauci ([http://code.google.com/p/waffit/ wafw00f])&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;51&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;October 30, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 Listen Now] | [[OWASP_Podcast/Transcripts/051|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Michael Coates (Real Time Defenses, [http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor])&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;50&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;October 30, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_50.mp3 Listen Now] | [[OWASP_Podcast/Transcripts/050|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Eldad Chai (Business Logic Attacks)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;49&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;October 30, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_49.mp3 Listen Now] | [[OWASP_Podcast/Transcripts/049|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Andre Riancho (OWASP w3af)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;48&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;October 30, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_48.mp3 Listen Now] | [[OWASP_Podcast/Transcripts/048|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Giorgio Fedon (Browser Security in Banking)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;47&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;October 23, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_47.mp3 Listen Now]| [[OWASP_Podcast/Transcripts/047|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Erlend Oftedal (Agile)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;46&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;October 23, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_46.mp3 Listen Now] | [[OWASP_Podcast/Transcripts/046|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Luca Carettoni and Stefano Di Paola (HTTP Parameter Pollution)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;45&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;October 16, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_45.mp3 Listen Now] | [[Podcast_45|Show Notes]] | [[OWASP_Podcast/Transcripts/045|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Buanzo ([http://www.buanzo.com.ar/pro/eng.html Enigform ])&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;44&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;October 8, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_44.mp3 Listen Now] | [[Podcast_44|Show Notes]] | [[OWASP_Podcast/Transcripts/044|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Andy Steingruebl (PayPal Secure Development Manager)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;43&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;October 2, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_43.mp3 Listen Now] | [[Podcast_43|Show Notes]] | [[OWASP_Podcast/Transcripts/043|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Mike Smith (http://www.guerilla-ciso.com/)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;42&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;October 1, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_42.mp3 Listen Now] | [[Podcast_42|Show Notes]] | [[OWASP_Podcast/Transcripts/042|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Roundtable with Matt Fisher, Jim Manico, Dan Philpott, Jack Whitsitt and Doug Wilson (FISMA, US Federal Cybersecurity)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;41&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;September 26, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_41.mp3 Listen Now] | [[Podcast_41|Show Notes]] | [[OWASP_Podcast/Transcripts/041|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with David Rice (Author of Geekonomics)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;40&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;September 23, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_40.mp3 Listen Now] | [[Podcast_40|Show Notes]] | [[OWASP_Podcast/Transcripts/040|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Rohit Sethi (OWASP J2EE Pattern Project)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;39&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;August 25, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_39.mp3 Listen Now] | [[Podcast_39|Show Notes]] | [[OWASP_Podcast/Transcripts/039|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Gunnar Peterson (Webservices)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;38&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;August 25, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_38.mp3 Listen Now] | [[Podcast_38|Show Notes]] | [[OWASP_Podcast/Transcripts/038|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with the OWASP Global Education Committee&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;37&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;August 22, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_37.mp3 Listen Now] | [[Podcast_37|Show Notes]] | [[OWASP_Podcast/Transcripts/037|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Jason Lam and Johannes Ullrich (SANS Institute)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;36&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;August 15, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_36.mp3 Listen Now] | [[Podcast_36|Show Notes]] | [[OWASP_Podcast/Transcripts/036|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;May 2009 News Commentary Recorded July 23 with Boaz Gelbord, Andre Gironda, Jason Lam, Jim Manico, Alex Smolen, Ben Tomhave, Andrew van der Stock and Jeff Williams (part 2)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;35&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;August 4, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_35.mp3 Listen Now] | [[Podcast_35|Show Notes]] | [[OWASP_Podcast/Transcripts/035|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Anton Chuvakin, Ph.D (PCI)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;34&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;July 30, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_34.mp3 Listen Now] | [[Podcast_34|Show Notes]] | [[OWASP_Podcast/Transcripts/034|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Amichai Shulman (WAF)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;33&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;July 25, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_33.mp3 Listen Now] | [[Podcast_33|Show Notes]] | [[OWASP_Podcast/Transcripts/033|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Paolo Perego (OWASP Orizon)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;32&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;July 21, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_32.mp3 Listen Now] | [[Podcast_32|Show Notes]] | [[OWASP_Podcast/Transcripts/032|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;May 2009 News Commentary Recorded June 11 with Arshan Dabirsiaghi, Boaz Gelbord, Jim Manico, Andrew van der Stock and Jeff Williams (part 1)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;31&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;July 4, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_31.mp3 Listen Now] | [[Podcast_31|Show Notes]] | [[OWASP_Podcast/Transcripts/031|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Mark Curphey (OWASP Founder)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;30&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;July 2, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_30.mp3 Listen Now] | [[Podcast_30|Show Notes]] | [[OWASP_Podcast/Transcripts/030|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Billy Hoffman and Matt Wood (HP Application Security Research)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;29&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;June 30, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_29.mp3 Listen Now] | [[Podcast_29|Show Notes]] | [[OWASP_Podcast/Transcripts/029|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Justin Clarke (SQL Injection)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;28&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;June 26, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_28.mp3 Listen Now] | [[Podcast_28|Show Notes]] | [[OWASP_Podcast/Transcripts/028|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Ross J. Anderson&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;27&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;June 26, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_27.mp3 Listen Now] | [[Podcast_27|Show Notes]] | [[OWASP_Podcast/Transcripts/027|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Rafal Los (The Skeletor of AppSec)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;26&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;June 17, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_26.mp3 Listen Now] | [[Podcast_26|Show Notes]] | [[OWASP_Podcast/Transcripts/026|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 2009 News Commentary Recorded May 28 with Tom Brennan, Andre Gironda, Jim Manico, Alex Smolen and Jeff Williams (part 2)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;25&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;June 15, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_25.mp3 Listen Now] | [[Podcast_25|Show Notes]] | [[OWASP_Podcast/Transcripts/025|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with James McGovern&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;24&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;June 12, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_24.mp3 Listen Now] | [[Podcast_24|Show Notes]] | [[OWASP_Podcast/Transcripts/024|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 2009 News Commentary Recorded May 14 with Andre Gironda, Jim Manico, Alex Smolen and Jeff Williams (part 1)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;23&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;June 1, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_23.mp3 Listen Now] | [[Podcast_23|Show Notes]] | [[OWASP_Podcast/Transcripts/023|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Dr. Boaz Gelbord&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;22&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;May 22, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_22.mp3 Listen Now] | [[Podcast_22|Show Notes]] | [[OWASP_Podcast/Transcripts/022|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Dan Cornell (Membership Committee)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;21&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;May 20, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_21.ogg Listen Now] | [[Podcast_21|Show Notes]] | [[OWASP_Podcast/Transcripts/021|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Richard Stallman&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;20&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;May 13, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_20.mp3 Listen Now] | [[Podcast_20|Show Notes]] | [[OWASP_Podcast/Transcripts/020|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Mike Bailey&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;19&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;May 11, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_19.mp3 Listen Now] | [[Podcast_19|Show Notes]] | [[OWASP_Podcast/Transcripts/019|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 2)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;18&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 30, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_18.mp3 Listen Now] | [[Podcast_18|Show Notes]] | [[OWASP_Podcast/Transcripts/018|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Jeremiah Grossman&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;17&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 21, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_17.mp3 Listen Now] | [[Podcast_17|Show Notes]] | [[OWASP_Podcast/Transcripts/017|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Robert Hansen&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;16&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 9, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_16.mp3 Listen Now] | [[Podcast_16|Show Notes]] | [[OWASP_Podcast/Transcripts/016|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Dave Aitel (Demonstrates Cool)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;15&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 4, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_15.mp3 Listen Now] | [[Podcast_15|Show Notes]] | [[OWASP_Podcast/Transcripts/015|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Brian Chess (BSIMM)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;14&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 25, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_14.mp3 Listen Now] | [[Podcast_14|Show Notes]] | [[OWASP_Podcast/Transcripts/014|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Pravir Chandra (OWASP SAMM)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;13&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 23, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_13.mp3 Listen Now] | [[Podcast_13|Show Notes]] | [[OWASP_Podcast/Transcripts/013|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 1)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;12&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 11, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_12.mp3 Listen Now] | [[Podcast_12|Show Notes]] | [[OWASP_Podcast/Transcripts/012|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Ryan Barnett (OWASP ModSecurity Core Ruleset)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;11&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 4, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_11.mp3 Listen Now] | [[Podcast_11|Show Notes]] | [[OWASP_Podcast/Transcripts/011|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with MITRE (Steve Christey and Bob Martin)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;10&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 26, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_10.mp3 Listen Now] | [[Podcast_10|Show Notes]] | [[OWASP_Podcast/Transcripts/010|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Ken van Wyk&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 20, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_9.mp3 Listen Now] | [[Podcast_9|Show Notes]] | [[OWASP_Podcast/Transcripts/009|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 2)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;8&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 20, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_8.mp3 Listen Now] | [[Podcast_8|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 1)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;January 30, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_7.mp3 Listen Now] | [[Podcast_7|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Jeff Williams&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;January 24, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_6.mp3 Listen Now] | [[Podcast_6|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Roundtable with Andre Gironda, Brian Holyfield, Jim Manico, Marcin Wielgoszewski&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;January 15, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_5.mp3 Listen Now] | [[Podcast_5|Show Notes]] | [[OWASP_Podcast/Transcripts/005|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Gary McGraw&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;January 13, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_4.mp3 Listen Now] | [[Podcast_4|Show Notes]] | [[OWASP_Podcast/Transcripts/004|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Andrew van der Stock (OWASP Developers Guide)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;December 30, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_3.mp3 Listen Now] | [[Podcast_3|Show Notes]] | [[OWASP_Podcast/Transcripts/003|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Matt Tesauro (OWASP Live CD)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;December 20, 2008&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_2.mp3 Listen Now] | [[Podcast_2|Show Notes]] | [[OWASP_Podcast/Transcripts/002|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Stephen Craig Evans (OWASP WebGoat/ModSecurity Project)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;November 21, 2008&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[https://www.owasp.org/download/jmanico/owasp_podcast_1.mp3 Listen Now] | [[Podcast_1|Show Notes]] | [[OWASP_Podcast/Transcripts/001|Show Transcript]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;News Commentary by Arshan Dabirsiaghi, Jeremiah Grossman, Jim Manico and Jeff Williams&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Contributors and Sponsors ====&lt;br /&gt;
&lt;br /&gt;
'''Host and Executive Producer'''&lt;br /&gt;
* [[User:Jmanico|Jim Manico]]&lt;br /&gt;
&lt;br /&gt;
'''Host and Producer'''&lt;br /&gt;
* Matt Tesauro&lt;br /&gt;
&lt;br /&gt;
'''Mastering, Effects, Audio Tech, Producer'''&lt;br /&gt;
* Kevin Coons from ManaTribe &lt;br /&gt;
&lt;br /&gt;
'''Artwork'''&lt;br /&gt;
* Larry Casey&lt;br /&gt;
* Gareth Heyes&lt;br /&gt;
&lt;br /&gt;
'''Transcript'''&lt;br /&gt;
* [[User:Zakiakhmad|Zaki Akhmad]]&lt;br /&gt;
&lt;br /&gt;
'''Sponsors'''&lt;br /&gt;
* The OWASP Foundation&lt;br /&gt;
* Music by [http://www.twistedmusic.com/artists/shpongle/ Shpongle] courtesy of [http://www.twistedmusic.com/ Twisted Records]&lt;br /&gt;
&lt;br /&gt;
==== Twitter ====&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/owasp_podcast http://twitter.com/owasp_podcast]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;twitter&amp;gt;20208646&amp;lt;/twitter&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Artwork ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[https://www.owasp.org/download/jmanico/OWASP_Podcast_200x200.jpg https://www.owasp.org/download/jmanico/OWASP_Podcast_200x200.jpg]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Larry Casey&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[https://www.owasp.org/download/jmanico/OWASP_Podcast2_200x200.jpg https://www.owasp.org/download/jmanico/OWASP_Podcast2_200x200.jpg]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Gareth Heyes&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=117418</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=117418"/>
				<updated>2011-09-15T19:00:20Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Dave Ferguson.  I am currently a Managing Principal Consultant at FishNet Security in Dallas, TX, USA.  I am a former chapter leader for OWASP's Kansas City chapter.  Earlier in my career, I was a mechanical engineer, C/C++ programmer, and Java web application developer.  Feel free to contact me at dave.ferguson[at]fishnetsecurity com.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Forgot_Password_Cheat_Sheet&amp;diff=106214</id>
		<title>Forgot Password Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Forgot_Password_Cheat_Sheet&amp;diff=106214"/>
				<updated>2011-03-03T18:15:08Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Introduction  =&lt;br /&gt;
&lt;br /&gt;
This article provides a simple model to follow when implementing a &amp;amp;quot;forgot password&amp;amp;quot; web application feature.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= The Problem =&lt;br /&gt;
&lt;br /&gt;
There is no industry standard for implementing a Forgot Password feature. The result is that you see applications forcing users to jump through myriad hoops involving emails, special URLs, temporary passwords, personal security questions, and so on. With some applications you can recover your existing password. In others you have to reset it to a new value.&lt;br /&gt;
&lt;br /&gt;
The recommendations presented here for implementing Forgot Password are most appropriate for organizations that have a business relationship with users. Web applications that target the general public (social networking, free email sites, etc.) are fundamentally different and some concepts presented may not be feasible in those situations.&lt;br /&gt;
&lt;br /&gt;
= Steps  =&lt;br /&gt;
&lt;br /&gt;
== Step 1) Gather Identity Data ==&lt;br /&gt;
&lt;br /&gt;
The first page of a secure Forgot Password feature asks the user for multiple pieces of hard data. A single HTML form should be used for all of the inputs.&lt;br /&gt;
&lt;br /&gt;
A minimum of three inputs is recommended, but the more you require, the more secure it will be. One of the inputs, preferably listed first, should be the username. Others can be selected depending on the nature of the data available to the application. Examples include:&lt;br /&gt;
&lt;br /&gt;
* email address&lt;br /&gt;
* last name&lt;br /&gt;
* date of birth&lt;br /&gt;
* account number&lt;br /&gt;
* customer number&lt;br /&gt;
* social security number&lt;br /&gt;
* zip code for address on file&lt;br /&gt;
* street number for address on file&lt;br /&gt;
&lt;br /&gt;
== Step 2) Verify Security Questions ==&lt;br /&gt;
&lt;br /&gt;
After the form on Step 1 is submitted, the application verifies that each piece of data is correct for the given username. If anything is incorrect, or if the username is not recognized, the second page displays a generic error message such as “Sorry, invalid data”. If all submitted data is correct, Step 2 should display at least two of the user’s pre-established personal security questions, along with input fields for the answers. It’s important that the answer fields are part of a single HTML form.&lt;br /&gt;
&lt;br /&gt;
Do not provide a drop-down list for the user to select the questions he wants to answer. Avoid sending the username as a parameter (hidden or otherwise) when the form on this page is submitted. The username should be stored in the server-side session where it can be retrieved as needed.&lt;br /&gt;
&lt;br /&gt;
==  Step 3) Send a Token Over a Side-Channel ==&lt;br /&gt;
&lt;br /&gt;
After step 2, email or SMS the user a randomly-generated code having 8 or more characters. This introduces an “out of band” communication channel and would be extremely tough for a hacker to overcome. If the bad guy has somehow managed to successfully get past steps 1 and 2, he is unlikely to have compromised the side channel. &lt;br /&gt;
&lt;br /&gt;
== Step 4) Allow user to change password ==&lt;br /&gt;
&lt;br /&gt;
Step 4 requires input of the code sent in step 3 and allows the user to reset his password.  Display a simple HTML form with one input field for the code, one for the new password, and one to confirm the new password. Verify the correct code is provided and be sure to enforce all password complexity requirements that exist in other areas of the application. As before, avoid sending the username as a parameter when the form is submitted.  Finally, it's critical to have a check to prevent a user from accessing this last step without first completing steps 1 and 2 correctly.  Otherwise, a [[forced browsing]] attack may be possible.&lt;br /&gt;
&lt;br /&gt;
= Related Articles  =&lt;br /&gt;
&lt;br /&gt;
FishNet Security White Paper - [http://www.fishnetsecurity.com/Resource_/PageResource/White_Papers/FishNetSecurity_SecureForgotPassword.pdf Best Practices for a Secure &amp;amp;quot;Forgot Password&amp;amp;quot; Feature] &lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Dave Ferguson - Dave.Ferguson[at]fishnetsecurity com&amp;lt;br/&amp;gt;&lt;br /&gt;
Jim Manico - jim[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Forgot_Password_Cheat_Sheet&amp;diff=106213</id>
		<title>Forgot Password Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Forgot_Password_Cheat_Sheet&amp;diff=106213"/>
				<updated>2011-03-03T18:10:43Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Introduction  =&lt;br /&gt;
&lt;br /&gt;
This article provides a simple model to follow when implementing a &amp;amp;quot;forgot password&amp;amp;quot; web application feature.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= The Problem =&lt;br /&gt;
&lt;br /&gt;
There is no industry standard for implementing a Forgot Password feature. The result is that you see applications forcing users to jump through myriad hoops involving emails, special URLs, temporary passwords, personal security questions, and so on. With some applications you can recover your existing password. In others you have to reset it to a new value.&lt;br /&gt;
&lt;br /&gt;
The recommendations presented here for implementing Forgot Password are most appropriate for organizations that have a business relationship with users. Web applications that target the general public (social networking, free email sites, etc.) are fundamentally different and some concepts presented may not be feasible in those situations.&lt;br /&gt;
&lt;br /&gt;
= Steps  =&lt;br /&gt;
&lt;br /&gt;
== Step 1) Gather Identity Data ==&lt;br /&gt;
&lt;br /&gt;
The first page of a secure Forgot Password feature asks the user for multiple pieces of hard data. A single HTML form should be used for all of the inputs.&lt;br /&gt;
&lt;br /&gt;
A minimum of three inputs is recommended, but the more you require, the more secure it will be. One of the inputs, preferably listed first, should be the username. Others can be selected depending on the nature of the data available to the application. Examples include:&lt;br /&gt;
&lt;br /&gt;
* email address&lt;br /&gt;
* last name&lt;br /&gt;
* date of birth&lt;br /&gt;
* account number&lt;br /&gt;
* customer number&lt;br /&gt;
* social security number&lt;br /&gt;
* zip code for address on file&lt;br /&gt;
* street number for address on file&lt;br /&gt;
&lt;br /&gt;
== Step 2) Verify Security Questions ==&lt;br /&gt;
&lt;br /&gt;
After the form on Step 1 is submitted, the application verifies that each piece of data is correct for the given username. If anything is incorrect, or if the username is not recognized, the second page displays a generic error message such as “Sorry, invalid data”. If all submitted data is correct, Step 2 should display at least two of the user’s pre-established personal security questions, along with input fields for the answers. It’s important that the answer fields are part of a single HTML form.&lt;br /&gt;
&lt;br /&gt;
Do not provide a drop-down list for the user to select the questions he wants to answer. Avoid sending the username as a parameter (hidden or otherwise) when the form on this page is submitted. The username should be stored in the server-side session where it can be retrieved as needed.&lt;br /&gt;
&lt;br /&gt;
==  Step 3) Send a Token Over a Side-Channel ==&lt;br /&gt;
&lt;br /&gt;
After step 2, email or SMS the user a randomly-generated code having 8 or more characters. This introduces an “out of band” communication channel and would be extremely tough for a hacker to overcome. If the bad guy has somehow managed to successfully get past steps 1 and 2, he is unlikely to have compromised the side channel. &lt;br /&gt;
&lt;br /&gt;
== Step 4) Allow user to change password ==&lt;br /&gt;
&lt;br /&gt;
Step 4 requires input of the code sent in step 3 and allows the user to reset his password.  Display a simple HTML form with one input field for the code, one for the new password, and one to confirm the new password. Verify the correct code is provided and be sure to enforce all password complexity requirements that exist in other areas of the application. As before, avoid sending the username as a parameter when the form is submitted.  Finally, it's critical to have a check to prevent a user from accessing this last step without first completing steps 1 and 2 correctly.  Otherwise, a forced browsing attack may be possible.&lt;br /&gt;
&lt;br /&gt;
= Related Articles  =&lt;br /&gt;
&lt;br /&gt;
FishNet Security White Paper - [http://www.fishnetsecurity.com/Resource_/PageResource/White_Papers/FishNetSecurity_SecureForgotPassword.pdf Best Practices for a Secure &amp;amp;quot;Forgot Password&amp;amp;quot; Feature] &lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Dave Ferguson - Dave.Ferguson[at]fishnetsecurity com&amp;lt;br/&amp;gt;&lt;br /&gt;
Jim Manico - jim[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=49910</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=49910"/>
				<updated>2008-12-29T17:49:27Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Dave Ferguson.  I am currently a Principal Consultant at FishNet Security in Dallas, TX, USA.  I am the former chapter leader for the OWASP-Kansas City chapter.  Earlier in my career, I was a mechanical engineer, C/C++ programmer, and Java web application developer.  Feel free to contact me at dave.ferguson[at]fishnetsecurity com.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Declarative_Access_Control_in_Java&amp;diff=27015</id>
		<title>Talk:Declarative Access Control in Java</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Declarative_Access_Control_in_Java&amp;diff=27015"/>
				<updated>2008-03-25T01:21:11Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Status==&lt;br /&gt;
Under review&lt;br /&gt;
&lt;br /&gt;
==Authors==&lt;br /&gt;
* Dave Ferguson&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
* Pierre Parrend&lt;br /&gt;
&lt;br /&gt;
==General Discussion==&lt;br /&gt;
* global comment: this overview is very quick, but clear and efficient&lt;br /&gt;
&lt;br /&gt;
* Introduction: a remainder of the technical context could be useful - what piece of code do one needs for executing this declarative access control: a servlet container ? a J2EE platform ?&lt;br /&gt;
&lt;br /&gt;
''DFerguson - I added some verbiage about JEE-compliant application servers.''&lt;br /&gt;
&lt;br /&gt;
* first XML excerpt: no global tag is shown. If I have a real Web App descriptor without security, in which tag should I put the given xml code ?&lt;br /&gt;
&lt;br /&gt;
''DFerguson - I added the web-xml root tag before and after the snippet.  There is also a link to the servlet spec in the Overview section now, which is for readers who want to see the deployment descriptor in detail.''&lt;br /&gt;
&lt;br /&gt;
* authentication methods 'Digest' ad 'Client cert' are evoked. How can they be implemented, i.e what is required on the client side (algorithm, certificate with proper issuer) and on the server side (algorithm for digest and certificate control, access to a trusted certificate database)&lt;br /&gt;
&lt;br /&gt;
''DFerguson - This is not my area of expertise, so I would need more time to research, or I would accept help from someone else of course.''&lt;br /&gt;
&lt;br /&gt;
* 2 different 'transport guarantees' are evoked, 'integral' and 'confidential'. What specific protocols, algorithms, and data, are required ?&lt;br /&gt;
&lt;br /&gt;
''DFerguson - My understanding is that Integral and Confidential causes the container simply enforces SSL communication.  I would need more time to research to supplement what is already there.''&lt;br /&gt;
&lt;br /&gt;
* SSL is evoked. a pointer toward a SSL page could be useful&lt;br /&gt;
&lt;br /&gt;
''DFerguson - I added a link to the OWASP SSL page, but it is just a stub and not very helpful.  Any other suggestions where the link should point to?''&lt;br /&gt;
&lt;br /&gt;
* no extra link is given. Is it deliberate from the Owasp editor ? Where can I go and look if I need further information ?&lt;br /&gt;
&lt;br /&gt;
''DFerguson - other than reference material in the servlet specification and various application server documentation, I don't know where more information is available.  That's one of the reasons I thought this page would be helpful.  Please let me know about anything that I might be missing.''&lt;br /&gt;
&lt;br /&gt;
* I usually recommend storing the JSP files used for form based authentication in the WEB-INF directory. This way they cannot be accessed directly from the browser&lt;br /&gt;
&lt;br /&gt;
''DFerguson - I don't understand why that would improve security.  What threat is mitigated by having the JSPs inaccessible from the browser?''&lt;br /&gt;
&lt;br /&gt;
''Jeff Williams'' - This is really critical to understand. In some applications, the JSPs are intended to be accessed directly, and they contain some business logic and some presentation layer.  But in most modern frameworks, there is a controller servlet that handles all the http request, invokes business logic, and '''forwards''' the request to the appropriate JSP. The JSP relies on information in the request or session attributes to be properly set.  If you invoke the JSP directly, you are likely to get null pointer exceptions (because the attributes aren't there). But many times you can figure out what parameters the JSP code is expecting and you can make it do something. And occasionally, what you can force it to do is unauthorized and very damaging.&lt;br /&gt;
&lt;br /&gt;
''DFerguson'' - Agreed, but if you know what you're doing you can prevent that from happening, such as having an include at the top of every JSP to check that the session state is valid.  I guess the key is that developers have to understand the issue.  I don't necessarily agree with an absolute rule about not accessing JSPs directly.  As we know a JSP is really just a servlet.  If you access a controller servlet directly, you can take steps to be able to safely access a JSP directly.  If you're using a framework where that is out of the ordinary, then certainly I would not do it.  I doubt someone using a framework would be using declarative access control anyway.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Declarative_Access_Control_in_Java&amp;diff=26819</id>
		<title>Talk:Declarative Access Control in Java</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Declarative_Access_Control_in_Java&amp;diff=26819"/>
				<updated>2008-03-19T16:35:48Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Status==&lt;br /&gt;
Under review&lt;br /&gt;
&lt;br /&gt;
==Authors==&lt;br /&gt;
* Dave Ferguson&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
* Pierre Parrend&lt;br /&gt;
&lt;br /&gt;
==General Discussion==&lt;br /&gt;
* global comment: this overview is very quick, but clear and efficient&lt;br /&gt;
&lt;br /&gt;
* Introduction: a remainder of the technical context could be useful - what piece of code do one needs for executing this declarative access control: a servlet container ? a J2EE platform ?&lt;br /&gt;
&lt;br /&gt;
''DFerguson - I added some verbiage about JEE-compliant application servers.''&lt;br /&gt;
&lt;br /&gt;
* first XML excerpt: no global tag is shown. If I have a real Web App descriptor without security, in which tag should I put the given xml code ?&lt;br /&gt;
&lt;br /&gt;
''DFerguson - I added the web-xml root tag before and after the snippet.  There is also a link to the servlet spec in the Overview section now, which is for readers who want to see the deployment descriptor in detail.''&lt;br /&gt;
&lt;br /&gt;
* authentication methods 'Digest' ad 'Client cert' are evoked. How can they be implemented, i.e what is required on the client side (algorithm, certificate with proper issuer) and on the server side (algorithm for digest and certificate control, access to a trusted certificate database)&lt;br /&gt;
&lt;br /&gt;
''DFerguson - This is not my area of expertise, so I would need more time to research, or I would accept help from someone else of course.''&lt;br /&gt;
&lt;br /&gt;
* 2 different 'transport guarantees' are evoked, 'integral' and 'confidential'. What specific protocols, algorithms, and data, are required ?&lt;br /&gt;
&lt;br /&gt;
''DFerguson - My understanding is that Integral and Confidential causes the container simply enforces SSL communication.  I would need more time to research to supplement what is already there.''&lt;br /&gt;
&lt;br /&gt;
* SSL is evoked. a pointer toward a SSL page could be useful&lt;br /&gt;
&lt;br /&gt;
''DFerguson - I added a link to the OWASP SSL page, but it is just a stub and not very helpful.  Any other suggestions where the link should point to?''&lt;br /&gt;
&lt;br /&gt;
* no extra link is given. Is it deliberate from the Owasp editor ? Where can I go and look if I need further information ?&lt;br /&gt;
&lt;br /&gt;
''DFerguson - other than reference material in the servlet specification and various application server documentation, I don't know where more information is available.  That's one of the reasons I thought this page would be helpful.  Please let me know about anything that I might be missing.''&lt;br /&gt;
&lt;br /&gt;
* I usually recommend storing the JSP files used for form based authentication in the WEB-INF directory. This way they cannot be accessed directly from the browser&lt;br /&gt;
&lt;br /&gt;
''DFerguson - I don't understand why that would improve security.  What threat is mitigated by having the JSPs inaccessible from the browser?''&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Declarative_Access_Control_in_Java&amp;diff=26750</id>
		<title>Talk:Declarative Access Control in Java</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Declarative_Access_Control_in_Java&amp;diff=26750"/>
				<updated>2008-03-17T20:55:46Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Status==&lt;br /&gt;
Under review&lt;br /&gt;
&lt;br /&gt;
==Authors==&lt;br /&gt;
* Dave Ferguson&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
* Pierre Parrend&lt;br /&gt;
&lt;br /&gt;
==General Discussion==&lt;br /&gt;
* global comment: this overview is very quick, but clear and efficient&lt;br /&gt;
&lt;br /&gt;
* Introduction: a remainder of the technical context could be useful - what piece of code do one needs for executing this declarative access control: a servlet container ? a J2EE platform ?&lt;br /&gt;
&lt;br /&gt;
''DFerguson - I added some verbiage about JEE-compliant application servers.''&lt;br /&gt;
&lt;br /&gt;
* first XML excerpt: no global tag is shown. If I have a real Web App descriptor without security, in which tag should I put the given xml code ?&lt;br /&gt;
&lt;br /&gt;
''DFerguson - I added the web-xml root tag before and after the snippet.  There is also a link to the servlet spec in the Overview section now, which is for readers who want to see the deployment descriptor in detail.''&lt;br /&gt;
&lt;br /&gt;
* authentication methods 'Digest' ad 'Client cert' are evoked. How can they be implemented, i.e what is required on the client side (algorithm, certificate with proper issuer) and on the server side (algorithm for digest and certificate control, access to a trusted certificate database)&lt;br /&gt;
&lt;br /&gt;
* 2 different 'transport guarantees' are evoked, 'integral' and 'confidential'. What specific protocols, algorithms, and data, are required ?&lt;br /&gt;
&lt;br /&gt;
* SSL is evoked. a pointer toward a SSL page could be useful&lt;br /&gt;
&lt;br /&gt;
''DFerguson - I added a link to the OWASP SSL page, which is a stub and not very helpful.  Any other idea where the link should point to?''&lt;br /&gt;
&lt;br /&gt;
* no extra link is given. Is it deliberate from the Owasp editor ? Where can I go and look if I need further information ?&lt;br /&gt;
&lt;br /&gt;
''DFerguson - other than reference material in the servlet specification and various application server documentation, I don't know where more information is available.  That's one of the reasons I thought this page would be helpful.  Please let me know about anything that I might be missing.''&lt;br /&gt;
&lt;br /&gt;
* I usually recommend storing the JSP files used for form based authentication in the WEB-INF directory. This way they cannot be accessed directly from the browser&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=26576</id>
		<title>User:Owaspdavef</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owaspdavef&amp;diff=26576"/>
				<updated>2008-03-10T21:43:28Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hi, my name is Dave Ferguson.  I'm an engineer and C/C++ programmer, turned Java web application developer, and now serving as a senior security consultant for FishNet Security in Dallas, TX, USA.  I am formerly the OWASP chapter leader for the Kansas City chapter.  Feel free to contact me at dave.ferguson[at]fishnetsecurity com.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=19635</id>
		<title>Kansas City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=19635"/>
				<updated>2007-07-09T16:18:27Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Kansas City|extra=If you have any questions about the Kansas City Chapter, please send an email to our [[User:Owaspdavef|chapter leader]]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-kansascity|emailarchives=http://lists.owasp.org/pipermail/owasp-kansascity}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
We are currently in the process of planning our next meeting.  Please be thinking about topics you'd like to see presented or discussed at the next meeting.&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE!&lt;br /&gt;
&lt;br /&gt;
*Attending an OWASP chapter meeting is free&lt;br /&gt;
*No registration required&lt;br /&gt;
*For CISSP’s, attending an OWASP meeting will give you valuable CPE credits&lt;br /&gt;
&lt;br /&gt;
We meet at least once a quarter to discuss application security.  If you have an interesting topic you'd like to present or discuss at future meetings, please send an email to bmarshall[at]securityps com.  Or, get a discussion going by posting a message to our [http://lists.owasp.org/mailman/listinfo/owasp-kansascity mailing list].&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
Thanks to everyone who attended our most recent [[Kansas City June 2007 Meeting|June 2007 meeting]]!&lt;br /&gt;
&lt;br /&gt;
*[[Kansas City March 2007 Meeting|March 2007 meeting]]&lt;br /&gt;
*[[Kansas City December 2006 Meeting|December 2006 meeting]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2007&amp;diff=19204</id>
		<title>Top 10 2007</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2007&amp;diff=19204"/>
				<updated>2007-06-18T15:24:39Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: Move a sentence in A2 that should be in A3.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Top_10_2007:TopTemplate|usenext=NextLink|next=-Methodology|useprev=Nothing|usemain=Nothing}}&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP Top 10 2007!  This totally re-written edition lists the most serious web application vulnerabilities, discusses how to protect against them, and provides links to more information.&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
&lt;br /&gt;
'''The primary aim of the OWASP Top 10 is to educate developers, designers, architects and organizations''' about the consequences of the most common web application security vulnerabilities. The Top 10 provides basic methods to protect against these vulnerabilities – a great start to your secure coding security program. &lt;br /&gt;
&lt;br /&gt;
'''Security is not a one-time event'''. It is insufficient to secure your code just once. By 2008, this Top 10 will have changed, and without changing a line of your application’s code, you may be vulnerable. Please review the advice in [[Top_10_2007-Where to Go From Here|Where to Go From Here]] for more information.&lt;br /&gt;
&lt;br /&gt;
'''A secure coding initiative must deal with all stages of a program’s lifecycle'''. Secure web applications are '''''only''''' possible when a secure SDLC is used. Secure programs are secure by design, during development, and by default. There are at least 300 issues that affect the overall security of a web application. These 300+ issues are detailed in the [http://www.owasp.org/index.php/OWASP_Guide_Project OWASP Guide], which is essential reading for anyone developing web applications today.&lt;br /&gt;
&lt;br /&gt;
'''This document is first and foremost an education piece, not a standard'''. Please do not adopt this document as a policy or standard without [mailto:owasp@owasp.org talking to us] first! If you need a secure coding policy or standard, OWASP has secure coding policies and standards projects in progress. Please consider joining or financially assisting with these efforts.&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|We thank [http://www.mitre.org/ MITRE] for making ''Vulnerability Type Distribution in [http://cve.mitre.org/ CVE]'' data freely available for use. The OWASP Top Ten project is led and sponsored by [http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif].  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Project Lead: 	Andrew van der Stock (Executive Director, OWASP Foundation)&lt;br /&gt;
&lt;br /&gt;
Co-authors: 	Jeff Williams (Chair, OWASP Foundation), Dave Wichers (Conference Chair, OWASP Foundation)&lt;br /&gt;
&lt;br /&gt;
We’d like to thank our reviewers:&lt;br /&gt;
&lt;br /&gt;
*Raoul Endres for help in getting the Top 10 going again and with his valuable comments. &lt;br /&gt;
*[mailto:coley...at...mitre.org Steve Christey](MITRE) for an extensive peer review and adding the MITRE CWE data&lt;br /&gt;
*[http://jeremiahgrossman.blogspot.com/ Jeremiah Grossman] ([http://www.whitehatsec.com/ WhiteHat Security]) for peer reviewing and contributing information about the success (or otherwise) of automated means of detection.&lt;br /&gt;
*[http://www.smithline.net/ Neil Smithline] ([http://www.bea.com/ BEA Systems]) for comments and producing the Wiki version.&lt;br /&gt;
*Sylvan von Stuppe for an exemplary peer review.&lt;br /&gt;
*Colin Wong, Nigel Evans and Andre Gironda for e-mailed comments.&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&lt;br /&gt;
{| border='1' cellpadding='2' &lt;br /&gt;
|-	&lt;br /&gt;
|[[Top_10_2007-A1|A1 - Cross Site Scripting (XSS)]]&lt;br /&gt;
|XSS flaws occur whenever an application takes user supplied data and sends it to a web browser without first validating or encoding that content. XSS allows attackers to execute script in the victim's browser which can hijack user sessions, deface web sites, possibly introduce worms, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A2|A2 - Injection Flaws]]&lt;br /&gt;
|Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker's hostile data tricks the interpreter into executing unintended commands or changing data.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A3|A3 - Malicious File Execution]]&lt;br /&gt;
|Code vulnerable to remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating attacks, such as total server compromise. Malicious file execution attacks affect PHP, XML and any framework which accepts filenames or files from users. &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A4|A4 - Insecure Direct Object Reference]]&lt;br /&gt;
|A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, database record, or key, as a URL or form parameter. Attackers can manipulate those references to access other objects without authorization.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A5|A5 - Cross Site Request Forgery (CSRF)]]&lt;br /&gt;
|A CSRF attack forces a logged-on victim's browser to send a pre-authenticated request to a vulnerable web application, which then forces the victim's browser to perform a hostile action to the benefit of the attacker. CSRF can be as powerful as the web application that it attacks.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A6|A6 - Information Leakage and Improper Error Handling]]&lt;br /&gt;
|Applications can unintentionally leak information about their configuration, internal workings, or violate privacy through a variety of application problems. Attackers use this weakness to steal sensitive data, or conduct more serious attacks. &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A7|A7 - Broken Authentication and Session Management]]&lt;br /&gt;
|Account credentials and session tokens are often not properly protected. Attackers compromise passwords, keys, or authentication tokens to assume other users' identities.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A8|A8 - Insecure Cryptographic Storage]]&lt;br /&gt;
|Web applications rarely use cryptographic functions properly to protect data and credentials. Attackers use weakly protected data to conduct identity theft and other crimes, such as credit card fraud.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A9|A9 - Insecure Communications]]&lt;br /&gt;
|Applications frequently fail to encrypt network traffic when it is necessary to protect sensitive communications.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A10|A10 - Failure to Restrict URL Access]]&lt;br /&gt;
|Frequently, an application only protects sensitive functionality by preventing the display of links or URLs to unauthorized users. Attackers can use this weakness to access and perform unauthorized operations by accessing those URLs directly.&lt;br /&gt;
|}&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Web application vulnerabilities for 2007&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
There are several pages in this document that are not dedicated to a specific vulnerability and hence are not listed in the table. Here is the list of them.&lt;br /&gt;
&lt;br /&gt;
{| border='1' cellpadding='2' &lt;br /&gt;
|-	&lt;br /&gt;
|[[Top 10 2007]]&lt;br /&gt;
|The main page for the document (this page). Besides providing an introduction, bookmarking the &amp;quot;Summary&amp;quot; section (this can be done by dragging [https://www.owasp.org/index.php/Top_10_2007#Summary this link] to your browser's bookmarks) gives you quick access to the entire document.&lt;br /&gt;
|-&lt;br /&gt;
|[[Top 10 2007-Methodology]]&lt;br /&gt;
|A description of the methodology used to select the vulnerabilities for this document. &lt;br /&gt;
|-&lt;br /&gt;
|[[Top 10 2007-Where to Go From Here]]&lt;br /&gt;
|Some advice as to how to proceed once you have read this document.&lt;br /&gt;
|-&lt;br /&gt;
|[[Top 10 2007-References]]&lt;br /&gt;
|Recommendations for further reading.&lt;br /&gt;
|}&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1a: Pages in the ''OWASP Top Ten 2007'' document other than the vulnerability pages listed above.&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
==A Note About The Different Versions==&lt;br /&gt;
While the only official version of the ''OWASP Top Ten 2007'' list is the downloadable English PDF version, OWASP has put together this Wiki that initially contains the same content as the PDF. But OWASP hopes that will change with your help. OWASP encourages community involvement and wants your help to make the Wiki version even better. To aid in this they have put together a brief [[Editing:Top_10_2007|tutorial]] to get you started.&lt;br /&gt;
&lt;br /&gt;
==Downloadable Versions==&lt;br /&gt;
You can download the Top 10 2007 (Final) here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf (PDF, 930 kb)]&lt;br /&gt;
&amp;lt;!--* [http://www.owasp.org/images/2/24/OWASP_Top_10_2007.doc (Word, 514 kb)]--&amp;gt;&lt;br /&gt;
* Looking for a version in another language? We could use your help translating. Contact Andrew van der Stock (vanderaj ...(@)... owasp.org) to help translating the OWASP Top 10 into your language.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2007:BottomTemplate|usenext=NextLink|next=-Methodology|useprev=Nothing|usemain=Nothing}}&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:KC_June_2007_Evaluating_and_Tuning_WAFs.pdf&amp;diff=19203</id>
		<title>File:KC June 2007 Evaluating and Tuning WAFs.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:KC_June_2007_Evaluating_and_Tuning_WAFs.pdf&amp;diff=19203"/>
				<updated>2007-06-18T14:32:31Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: Presentation given at Kansas City June 2007 chapter meeting.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Presentation given at Kansas City June 2007 chapter meeting.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=19189</id>
		<title>Kansas City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=19189"/>
				<updated>2007-06-14T21:00:45Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Kansas City|extra=If you have any questions about the Kansas City Chapter, please send an email to our [[User:Owaspdavef|chapter leader]]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-kansascity|emailarchives=http://lists.owasp.org/pipermail/owasp-kansascity}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
We are currently in the process of planning our next meeting.  Please be thinking about topics you'd like to see presented or discussed at the next meeting.&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE!&lt;br /&gt;
&lt;br /&gt;
*Attending an OWASP chapter meeting is free&lt;br /&gt;
*No registration required&lt;br /&gt;
*For CISSP’s, attending an OWASP meeting will give you valuable CPE credits&lt;br /&gt;
&lt;br /&gt;
We meet at least once a quarter to discuss application security.  If you have an interesting topic you'd like to present or discuss at future meetings, please send an email to dave.ferguson[at]fishnetsecurity com.  Or, get a discussion going by posting a message to our [http://lists.owasp.org/mailman/listinfo/owasp-kansascity mailing list].&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
Thanks to everyone who attended our most recent [[Kansas City June 2007 Meeting|June 2007 meeting]]!&lt;br /&gt;
&lt;br /&gt;
*[[Kansas City March 2007 Meeting|March 2007 meeting]]&lt;br /&gt;
*[[Kansas City December 2006 Meeting|December 2006 meeting]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:KC_June_2007_Firefox_as_AppSec_Tool.zip&amp;diff=19188</id>
		<title>File:KC June 2007 Firefox as AppSec Tool.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:KC_June_2007_Firefox_as_AppSec_Tool.zip&amp;diff=19188"/>
				<updated>2007-06-14T20:52:29Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: Presentation given at Kansas City June 2007 chapter meeting.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Presentation given at Kansas City June 2007 chapter meeting.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City_June_2007_Meeting&amp;diff=19187</id>
		<title>Kansas City June 2007 Meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City_June_2007_Meeting&amp;diff=19187"/>
				<updated>2007-06-14T20:50:10Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: New page: The OWASP Kansas City chapter meeting in June 2007 was held from 6:30 to 8:30 pm on 6/13/2007.  The location of the meeting was at the offices of FishNet Security at 1627 M...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP [[Kansas City|Kansas City chapter]] meeting in June 2007 was held from 6:30 to 8:30 pm on 6/13/2007.  The location of the meeting was at the offices of FishNet Security at 1627 Main Street in Kansas City, MO.&lt;br /&gt;
&lt;br /&gt;
=== Meeting Summary ===&lt;br /&gt;
&lt;br /&gt;
Dave Ferguson of FishNet Security started the meeting with a welcome and overview of OWASP.  Attendee Rohini Sulatycki briefly described the new OWASP AJAX project, for which she is the project leader.  Next, Dave Ferguson announced that he would be stepping down as the OWASP Kansas City chapter leader due to the fact that he is relocating to the Dallas, TX area.  A search for a new chapter leader will begin.&lt;br /&gt;
&lt;br /&gt;
Our first speaker was Jake Reynolds from FishNet Security.  Jake described more than a dozen different Firefox extensions that involve some aspect of web application security.  Some, such as TamperData and Web Developer, provide useful functionality for auditing/assessing the security of an application.  Others, such as httpOnly and NoScript, are specialized extensions that can keep you safer when surfing the Internet.&lt;br /&gt;
&lt;br /&gt;
Following a break, Barry Archer from American Century Investments presented on the topic of web application firewalls.  Specifically, Barry talked about his experience with evaluating mod_security for Apache and a particular commercial WAF product.  Issues such as negative vs. positive security models, the importance of having a well-designed log format, and how to handle updates to an application were discussed.   Barry also explained why you need to understand HTTP in order to properly &amp;quot;tune&amp;quot; a WAF.&lt;br /&gt;
&lt;br /&gt;
=== Documents ===&lt;br /&gt;
[[Media:KC_June_2007_Firefox_as_AppSec_Tool.zip|Firefox as a Web Application Security Assessment Tool]] (ppt within a zip)&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Media:KC_June_2007_Evaluating_and_Tuning_WAFs.pdf|Evaluating and Tuning Web Application Firewalls]] (pdf)&amp;lt;br/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=19138</id>
		<title>Kansas City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=19138"/>
				<updated>2007-06-12T04:03:28Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Kansas City|extra=If you have any questions about the Kansas City Chapter, please send an email to our [[User:Owaspdavef|chapter leader]]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-kansascity|emailarchives=http://lists.owasp.org/pipermail/owasp-kansascity}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
Our next chapter meeting in Kansas City will be held the evening of June 13.  Here are the details.&lt;br /&gt;
&lt;br /&gt;
 When: Wednesday, June 13, 2007, 6:30-8:30 pm.&lt;br /&gt;
 Where: FishNet Security at 1627 Main Street, KC, MO, 7th floor   &lt;br /&gt;
 (this is the 12 story building on northeast corner of 17th and Main)&lt;br /&gt;
 Notes:&lt;br /&gt;
 - A FishNet Security employee will be available to escort you up to the 7th floor&lt;br /&gt;
 - Parking is available in the lot on the west side of Main, or anywhere along 17th Street&lt;br /&gt;
&lt;br /&gt;
Here is the agenda for the meeting:&lt;br /&gt;
 &lt;br /&gt;
 6:30 - 6:45 pm -- Welcome, Announcements, Introductions&lt;br /&gt;
 6:45 - 7:30 pm -- Firefox Security Utilities (Jake Reynolds)&lt;br /&gt;
 7:30 - 7:35 pm -- break&lt;br /&gt;
 7:35 - 8:15 pm -- Evaluating Web App Firewalls (Barry Archer)&lt;br /&gt;
 8:15 - 8:30 pm -- wrap-up, miscellaneous discussions&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE!&lt;br /&gt;
&lt;br /&gt;
*Attending an OWASP chapter meeting is free&lt;br /&gt;
*No registration required&lt;br /&gt;
*For CISSP’s, attending an OWASP meeting will give you valuable CPE credits&lt;br /&gt;
&lt;br /&gt;
We meet at least once a quarter to discuss application security.  If you have an interesting topic you'd like to present or discuss at future meetings, please send an email to dave.ferguson[at]fishnetsecurity com.  Or, get a discussion going by posting a message to our [http://lists.owasp.org/mailman/listinfo/owasp-kansascity mailing list].&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
Thanks to everyone who attended our [[Kansas City March 2007 Meeting|March 2007 meeting]]!&lt;br /&gt;
&lt;br /&gt;
[[Kansas City December 2006 Meeting|December 2006 meeting]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=19072</id>
		<title>Kansas City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=19072"/>
				<updated>2007-06-08T15:48:26Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: added agenda for 6/13 meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Kansas City|extra=If you have any questions about the Kansas City Chapter, please send an email to our [[User:Owaspdavef|chapter leader]]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-kansascity|emailarchives=http://lists.owasp.org/pipermail/owasp-kansascity}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
Our next chapter meeting in Kansas City will be held the evening of June 13.  Here are the details if you'd like to get in onto your calendar.&lt;br /&gt;
&lt;br /&gt;
 When: Wednesday, June 13, 2007, 6:30-8:30 pm.&lt;br /&gt;
 Where: FishNet Security at 1627 Main Street, KC, MO, 7th floor   &lt;br /&gt;
 (this is the 12 story building on northeast corner of 17th and Main)&lt;br /&gt;
 Notes:&lt;br /&gt;
 - A FishNet Security employee will be available to escort you up to the 7th floor&lt;br /&gt;
 - Parking is available in the lot on the west side of Main, or anywhere along 17th Street&lt;br /&gt;
&lt;br /&gt;
Here is the agenda for the meeting:&lt;br /&gt;
 &lt;br /&gt;
 6:30 - 6:45 pm -- Welcome, Announcements, Introductions&lt;br /&gt;
 6:45 - 7:30 pm -- Firefox Security Utilities (Jake Reynolds)&lt;br /&gt;
 7:30 - 7:35 pm -- break&lt;br /&gt;
 7:35 - 8:15 pm -- Evaluating Web App Firewalls (Barry Archer)&lt;br /&gt;
 8:15 - 8:30 pm -- wrap-up, miscellaneous discussions&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE!&lt;br /&gt;
&lt;br /&gt;
*Attending an OWASP chapter meeting is free&lt;br /&gt;
*No registration required&lt;br /&gt;
*For CISSP’s, attending an OWASP meeting will give you valuable CPE credits&lt;br /&gt;
&lt;br /&gt;
We meet at least once a quarter to discuss application security.  If you have an interesting topic you'd like to present or discuss at future meetings, please send an email to dave.ferguson[at]fishnetsecurity com.  Or, get a discussion going by posting a message to our [http://lists.owasp.org/mailman/listinfo/owasp-kansascity mailing list].&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
Thanks to everyone who attended our [[Kansas City March 2007 Meeting|March 2007 meeting]]!&lt;br /&gt;
&lt;br /&gt;
[[Kansas City December 2006 Meeting|December 2006 meeting]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=18818</id>
		<title>OWASP Community</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=18818"/>
				<updated>2007-05-24T16:11:09Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: /* Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is for people to post OWASP related events, such as chapter meetings, OWASP conferences, get-togethers, and OWASP sponsored events.&lt;br /&gt;
&lt;br /&gt;
Events from previous years are archived here:&lt;br /&gt;
* '''[[OWASP Community 2006]]'''&lt;br /&gt;
&lt;br /&gt;
This page is monitored, and items posted here will be copied to the OWASP [[Main Page]].  Please post new items in chronological order using the following format:&lt;br /&gt;
&lt;br /&gt;
 '''Mon ## (##:00h) - [[Article]]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
CHAPTER LEADS -- please put your schedule here and we'll post a month in advance&lt;br /&gt;
&lt;br /&gt;
*** Belgium ***&lt;br /&gt;
&lt;br /&gt;
*** OTTAWA: Rough dates ***&lt;br /&gt;
'''Sept 12 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
'''Nov 14 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
*** BOSTON: Every first Wednesday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** MELBOURNE: First Tuesday of the month ***&lt;br /&gt;
'''Jul 3 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
*** NETHERLANDS: Second Thursday of the month sometimes ***&lt;br /&gt;
'''Sept 13 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
'''Dec 13 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
*** ROCHESTER: Every third Monday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** TORONTO: Every second Wednesday of the month&lt;br /&gt;
&lt;br /&gt;
*** VIRGINIA: Every second thursday of the month ***&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Events==&lt;br /&gt;
&lt;br /&gt;
'''June 26 (11:30hr) - [[Austin|Austin chapter meeting]]''' - Running Web Application Scans&lt;br /&gt;
&lt;br /&gt;
'''June 15 (17:00hr) - [[Spain|Spain chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 13 (18:30hr) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 12 (18:00hr) - [[New Jersey|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (19:00h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (17:30h) - [[Houston | Houston Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 (9:00h) - [[http://www.owasp.org/index.php/Italy#May_29th.2C_2007_-_Seminar:_.22Software_Security.22 Italy@Firenze Tecnologia]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 (11:30h) - [[Austin | Austin Chapter Meeting]]''' - Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''May 29 (18:00h) - [[Ottawa | Ottawa Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 22 (18:30h) - [[New Zealand|1st New Zealand chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 21 (14:00h) - [[Israel|2nd OWASP Israel mini conference]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 15 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 10 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 9 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 8 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 6 (11:00h) - [[Turkey|Turkey chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 2 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 1 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 26 (11:00h) - [[San Antonio|San Antonio chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 26 (17:00h) - [[Switzerland|Switzerland chapter meeting and &amp;quot;Swiss Security Dinner&amp;quot;]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 24 (18:00h) - [[Minneapolis St Paul|Minneapolis St Paul chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 20 (19:00h) - [[Hong Kong|Hong Kong chapter meeting - Objectives for 2007]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 19 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 18 (17:00h) - [[San Francisco City Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 17 (18:00h) - [[New Jersey|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 17 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[San Jose|San Jose chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 11 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 4 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 3 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 30 - [[http://www.owasp.org/index.php/Italy#March_30th.2C_2007_-_Master_in_Security_-_University_of_Rome_.22La_Sapienza.22| Italy@Master in Security at &amp;quot;La Sapienza&amp;quot;]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 28 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 28 (11:30h) - [[San Antonio|San Antonio chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
; '''Mar 27-30 - [http://www.blackhat.com Black Hat Euro]'''&lt;br /&gt;
: OWASP members receive a Euro 100 Briefings discount by inserting BH7EUASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Mar 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 21-22 - [[Belgium#OWASP_Top_10_2007_Update_.28Infosecurity_Belgium.2C_21_.26_.2622_Mar_2007.29|Belgium@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 20 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 14 (18:00h) - [[Chicago|Chicago chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 13 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 8 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[Philadelphia|Philadelphia chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[San Francisco|San Francisco and San Jose chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 5 (11:00h) - [[New Jersey|New Jersey chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 1 (11:30h) - [http://www.eusecwest.com/agenda.html EUSecWest 07: Testing Guide]'''&lt;br /&gt;
&lt;br /&gt;
; '''Feb 26-Mar 1 - [http://www.blackhat.com Black Hat DC]'''&lt;br /&gt;
: OWASP members receive a $100 Briefings discount by inserting BH7DCASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Feb 28 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 27 (18:00h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:30h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 21 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 19 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 13 (18:00h) - [[Ireland|Ireland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 12 (18:30h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6-7 - [[Italy#February_6th-8th.2C_2007_-_InfoSecurity|Italy@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 2 (14:00h) - [[Chennai|Chennai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 31 (15:00h) - [[Mumbai|Mumbai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 30 (11:30h) - [[Austin|Austin chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (18:00h) - [[San Francisco| San Francisco chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (14:30h) - [[Italy#October_25th.2C_2007_-_Isaca_Rome|Italy@ISACA Rome]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 24 (17:30h) - [[Israel#6th_OWASP_IL_meeting:_Wednesday.2C_January_24th_2007|6th OWASP Israel chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 23 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 22 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 17 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 16 (17:45h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:30h) - [[Phoenix|Phoenix chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 10 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 8 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 3 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=18817</id>
		<title>Kansas City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=18817"/>
				<updated>2007-05-24T16:01:42Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Kansas City|extra=If you have any questions about the Kansas City Chapter, please send an email to our [[User:Owaspdavef|chapter leader]]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-kansascity|emailarchives=http://lists.owasp.org/pipermail/owasp-kansascity}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
Our next chapter meeting in Kansas City will be on June 13.  An agenda has not yet been determined.  Here are the details if you'd like to get in onto your calendar.&lt;br /&gt;
&lt;br /&gt;
 When: Wednesday, June 13, 2007, 6:30-8:30 pm.&lt;br /&gt;
 Where: FishNet Security at 1627 Main Street, KC, MO, 7th floor   &lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE!&lt;br /&gt;
&lt;br /&gt;
*Attending an OWASP chapter meeting is free&lt;br /&gt;
*No registration required&lt;br /&gt;
*For CISSP’s, attending an OWASP meeting will give you valuable CPE credits&lt;br /&gt;
&lt;br /&gt;
We meet at least once a quarter to discuss application security.  If you have an interesting topic you'd like to present or discuss at future meetings, please send an email to dave.ferguson[at]fishnetsecurity com.  Or, get a discussion going by posting a message to our [http://lists.owasp.org/mailman/listinfo/owasp-kansascity mailing list].&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
Thanks to everyone who attended our [[Kansas City March 2007 Meeting|March 2007 meeting]]!&lt;br /&gt;
&lt;br /&gt;
[[Kansas City December 2006 Meeting|December 2006 meeting]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City_March_2007_Meeting&amp;diff=17289</id>
		<title>Kansas City March 2007 Meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City_March_2007_Meeting&amp;diff=17289"/>
				<updated>2007-03-16T18:45:45Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP [[Kansas City|Kansas City chapter]] meeting in March 2007 was held from 6:30 to 8:30 pm on 3/7/2007.  The location of the meeting was at the local Microsoft office in Corporate Woods in Overland Park (10801 Mastin Blvd, Suite 620).&lt;br /&gt;
&lt;br /&gt;
=== Meeting Summary ===&lt;br /&gt;
&lt;br /&gt;
Dave Ferguson started the meeting with a welcome and brief overview of OWASP.  Membership options were described as well as the upcoming [[OWASP Spring Of Code 2007|Spring of Code 2007]] campaign where OWASP will be offering cash payouts to individuals for a variety of different approved projects.  Everyone at the meeting then introduced themselves to the group.&lt;br /&gt;
&lt;br /&gt;
Our first speaker was Tom Stripling from Security PS.  Tom's topic was advanced script injection.  He presented a variety of clever and interesting ways that attackers can take advantage of vulnerabilities and hinted as some nasty worm-like attacks that could start appearing in the future.   &lt;br /&gt;
&lt;br /&gt;
Following a break, Rohini Sulatycki from VML had a very informative presentation about the security issues around Adobe Flash.  Rohini discussed the growing popularity of Flash and some vulnerabilites that existed in previous versions.  Special attention was given to the importance of understanding Flash Remoting and Shared Objects.&lt;br /&gt;
&lt;br /&gt;
The evening ended with a couple of book giveaways.  Microsoft provided the group with two copies of Writing Secure Code (2nd Edition) by Michael Howard and David LeBlanc.  Two lucky attendees went home with a copy.&lt;br /&gt;
&lt;br /&gt;
=== Documents ===&lt;br /&gt;
[[Media:KC_Mar2007_Advanced_Injection_Attacks.zip|Advanced Injection Attacks]] (ppt within a zip)&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Media:KC_Mar2007_Flash_Security.pdf|Adobe Flash Security]] (pdf)&amp;lt;br/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City_March_2007_Meeting&amp;diff=17114</id>
		<title>Kansas City March 2007 Meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City_March_2007_Meeting&amp;diff=17114"/>
				<updated>2007-03-09T16:02:06Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP [[Kansas City|Kansas City chapter]] meeting in March 2007 was held from 6:30 to 8:30 pm on 3/7/2007.  The location of the meeting was at the local Microsoft office in Corporate Woods in Overland Park (10801 Mastin Blvd, Suite 620).&lt;br /&gt;
&lt;br /&gt;
=== Meeting Summary ===&lt;br /&gt;
&lt;br /&gt;
Dave Ferguson started the meeting with a welcome and brief overview of OWASP.  Membership options were described as well as the upcoming Spring of Code 2007 campaign where OWASP will be offering cash payouts to individuals for a variety of different approved projects.  Everyone at the meeting then introduced themselves to the group.&lt;br /&gt;
&lt;br /&gt;
Our first speaker was Tom Stripling from Security PS.  Tom's topic was advanced script injection.  He presented a variety of clever and interesting ways that attackers can take advantage of vulnerabilities and hinted as some nasty worm-like attacks that could start appearing in the future.   &lt;br /&gt;
&lt;br /&gt;
Following a break, Rohini Sulatycki from VML had a very informative presentation about the security issues around Adobe Flash.  Rohini discussed the growing popularity of Flash and some vulnerabilites that existed in previous versions.  Special attention was given to the importance of understanding Flash Remoting and Shared Objects.&lt;br /&gt;
&lt;br /&gt;
The evening ended with a couple of book giveaways.  Microsoft provided the group with two copies of Writing Secure Code (2nd Edition) by Michael Howard and David LeBlanc.  Two lucky attendees went home with a copy.&lt;br /&gt;
&lt;br /&gt;
=== Documents ===&lt;br /&gt;
[[Media:KC_Mar2007_Advanced_Injection_Attacks.zip|Advanced Injection Attacks]] (ppt within a zip)&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Media:KC_Mar2007_Flash_Security.pdf|Adobe Flash Security]] (pdf)&amp;lt;br/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:KC_Mar2007_Flash_Security.pdf&amp;diff=17113</id>
		<title>File:KC Mar2007 Flash Security.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:KC_Mar2007_Flash_Security.pdf&amp;diff=17113"/>
				<updated>2007-03-09T15:57:26Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: March 2007 presentation at OWASP-Kansas City chapter meeting.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;March 2007 presentation at OWASP-Kansas City chapter meeting.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:KC_Mar2007_Advanced_Injection_Attacks.zip&amp;diff=17112</id>
		<title>File:KC Mar2007 Advanced Injection Attacks.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:KC_Mar2007_Advanced_Injection_Attacks.zip&amp;diff=17112"/>
				<updated>2007-03-09T15:55:15Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: March 2007 presentation at OWASP-Kansas City chapter meeting.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;March 2007 presentation at OWASP-Kansas City chapter meeting.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=17105</id>
		<title>Kansas City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=17105"/>
				<updated>2007-03-08T22:08:49Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: Added link for March 2007 meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Kansas City|extra=If you have any questions about the Kansas City Chapter, please send an email to our [[User:Owaspdavef|chapter leader]]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-kansascity|emailarchives=http://lists.owasp.org/pipermail/owasp-kansascity}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
We are currently in the process of planning our next chapter meeting.  Details will follow as soon as they become available!   &lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE!&lt;br /&gt;
&lt;br /&gt;
*Attending an OWASP chapter meeting is free&lt;br /&gt;
*No registration required&lt;br /&gt;
*For CISSP’s, attending an OWASP meeting will give you valuable CPE credits&lt;br /&gt;
&lt;br /&gt;
We meet at least once a quarter to discuss application security.  If you have an interesting topic you'd like to present or discuss at future meetings, please send an email to dave.ferguson[at]fishnetsecurity com.  Or, get a discussion going by posting a message to our [http://lists.owasp.org/mailman/listinfo/owasp-kansascity mailing list].&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
Thanks to everyone who attended our [[Kansas City March 2007 Meeting|March 2007 meeting]]!&lt;br /&gt;
&lt;br /&gt;
[[Kansas City December 2006 Meeting|December 2006 meeting]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City_March_2007_Meeting&amp;diff=17104</id>
		<title>Kansas City March 2007 Meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City_March_2007_Meeting&amp;diff=17104"/>
				<updated>2007-03-08T22:07:01Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP [[Kansas City|Kansas City chapter]] meeting in March 2007 was held from 6:30 to 8:30 pm on 3/7/2007.  The location of the meeting was at the local Microsoft office in Corporate Woods in Overland Park (10801 Mastin Blvd, Suite 620).&lt;br /&gt;
&lt;br /&gt;
=== Meeting Summary ===&lt;br /&gt;
&lt;br /&gt;
Dave Ferguson started the meeting with a welcome and brief overview of OWASP.  Membership options were described as well as the upcoming Spring of Code 2007 campaign where OWASP will be offering cash payouts to individuals for a variety of different approved projects.  Everyone at the meeting then introduced themselves to the group.&lt;br /&gt;
&lt;br /&gt;
Our first speaker was Tom Stripling from Security PS.  Tom's topic was advanced script injection.  He presented a variety of clever and interesting ways that attackers can take advantage of vulnerabilities and hinted as some nasty worm-like attacks that could start appearing in the future.   &lt;br /&gt;
&lt;br /&gt;
Following a break, Rohini Sulatycki from VML had a very informative presentation about the security issues around Adobe Flash.  Rohini discussed the growing popularity of Flash and some vulnerabilites that were identified in previous versions.  Special attention was given to the importance of understanding Flash Remoting and Shared Objects.&lt;br /&gt;
&lt;br /&gt;
The evening ended with a couple of book giveaways.  Microsoft provided the group with two copies of Writing Secure Code (2nd Edition) by Michael Howard and David LeBlanc.  Two lucky attendees went home with a copy.&lt;br /&gt;
&lt;br /&gt;
=== Documents ===&lt;br /&gt;
(coming soon)&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City_March_2007_Meeting&amp;diff=17103</id>
		<title>Kansas City March 2007 Meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City_March_2007_Meeting&amp;diff=17103"/>
				<updated>2007-03-08T22:06:01Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP [[Kansas City|Kansas City chapter]] meeting in March 2007 was held from 6:30 to 8:30 pm on 3/7/2007.  The location of the meeting was at the local Microsoft office in Corporate Woods in Overland Park (10801 Mastin Blvd, Suite 620).&lt;br /&gt;
&lt;br /&gt;
=== Meeting Summary ===&lt;br /&gt;
&lt;br /&gt;
Dave Ferguson started the meeting with a welcome and brief overview of OWASP.  Membership options were described as well as the upcoming Spring of Code 2007 campaign where OWASP will be offering cash payouts to individuals for a variety of different approved projects.  Everyone at the meeting then introduced themselves to the group.&lt;br /&gt;
&lt;br /&gt;
Our first speaker was Tom Stripling from Security PS.  Tom's topic was advanced script injection.  He presented a variety of clever and interesting ways that attackers can take advantage of vulnerabilities and hinted as some nasty worm-like attacks that could start appearing in the future.   &lt;br /&gt;
&lt;br /&gt;
Following a break, Rohini Sulatycki from VML had a very informative presentation about the security issues around Adobe Flash.  Rohini discussed the growing popularity of Flash and some vulnerabilites that were identified in previous versions.  Special attention was given to the importance of understanding Flash Remoting and Shared Objects.&lt;br /&gt;
&lt;br /&gt;
The evening ended with a couple of book giveaways.  Microsoft provided the group with two copies of Writing Secure Code (2nd Edition) by Michael Howard and David LeBlanc.  Two lucky attendees went home with a copy.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City_March_2007_Meeting&amp;diff=17102</id>
		<title>Kansas City March 2007 Meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City_March_2007_Meeting&amp;diff=17102"/>
				<updated>2007-03-08T22:00:04Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: New page: === Meeting Summary ===  Dave Ferguson started the meeting with a welcome and brief overview of OWASP.  Membership options were described as well as the upcoming Spring of Code 2007 campai...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Meeting Summary ===&lt;br /&gt;
&lt;br /&gt;
Dave Ferguson started the meeting with a welcome and brief overview of OWASP.  Membership options were described as well as the upcoming Spring of Code 2007 campaign where OWASP will be offering cash payouts to individuals for a variety of different approved projects.  Everyone at the meeting then introduced themselves to the group.&lt;br /&gt;
&lt;br /&gt;
Our first speaker was Tom Stripling from Security PS.  Tom's topic was advanced script injection.  He presented a variety of clever and interesting ways that attackers can take advantage of vulnerabilities and hinted as some nasty worm-like attacks that could start appearing in the future.   &lt;br /&gt;
&lt;br /&gt;
Following a break, Rohini Sulatycki from VML had a very informative presentation about the security issues around Adobe Flash.  Rohini discussed the growing popularity of Flash and some vulnerabilites that were identified in previous versions.  Special attention was given to the importance of understanding Flash Remoting and Shared Objects.&lt;br /&gt;
&lt;br /&gt;
The evening ended with a couple of book giveaways.  Microsoft provided the group with two copies of Writing Secure Code (2nd Edition) by Michael Howard and David LeBlanc.  Two lucky attendees went home with a copy.&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=17101</id>
		<title>Kansas City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kansas_City&amp;diff=17101"/>
				<updated>2007-03-08T21:00:59Z</updated>
		
		<summary type="html">&lt;p&gt;Owaspdavef: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Kansas City|extra=If you have any questions about the Kansas City Chapter, please send an email to our [[User:Owaspdavef|chapter leader]]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-kansascity|emailarchives=http://lists.owasp.org/pipermail/owasp-kansascity}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
Our next chapter meeting is scheduled for Wednesday, March 7, 2007 from 6:30 to 8:15 pm.  This time we will meet in Overland Park.  The local Microsoft office in Corporate Woods was kind enough to let us use their facility.  The address is: &lt;br /&gt;
&lt;br /&gt;
 10801 Mastin Blvd.&lt;br /&gt;
 Suite 620&lt;br /&gt;
 Corporate Woods Office Park&lt;br /&gt;
 Overland Park, KS  66210 &lt;br /&gt;
&lt;br /&gt;
Here is the rough agenda for the meeting.&lt;br /&gt;
 &lt;br /&gt;
 6:30-6:45 pm - Welcome and Introductions (Dave Ferguson)&lt;br /&gt;
 6:45-7:30 pm - Advanced Cross-Site Scripting (Tom Stripling)&lt;br /&gt;
                Break&lt;br /&gt;
 7:35-8:15 pm - Adobe Flash Security (Rohini Sulatycki)&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE!&lt;br /&gt;
&lt;br /&gt;
*Attending an OWASP chapter meeting is free&lt;br /&gt;
*No registration required&lt;br /&gt;
*For CISSP’s, attending an OWASP meeting will give you valuable CPE credits&lt;br /&gt;
&lt;br /&gt;
We meet at least once a quarter to discuss application security.  If you have an interesting topic you'd like to present or discuss at future meetings, please send an email to dave.ferguson[at]fishnetsecurity com.  Or, get a discussion going by posting a message to our [http://lists.owasp.org/mailman/listinfo/owasp-kansascity mailing list].&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
Thanks to everyone who attended our [[Kansas City March 2007 Meeting|March 2007 meeting]]!&lt;br /&gt;
&lt;br /&gt;
[[Kansas City December 2006 Meeting|December 2006 meeting]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Owaspdavef</name></author>	</entry>

	</feed>