|
|
(68 intermediate revisions by 6 users not shown) |
Line 1: |
Line 1: |
− | '''[[Podcast_News|OWASP Podcast News]]''' | + | '''[[Podcast_News|OWASP Podcast News]]''' |
| | | |
− | OWASP NEWS April 2009<br/> | + | OWASP NEWS 2010<br> |
| | | |
− | ==OWASP AppSec News== | + | == OWASP Podcast Roundtable == |
− | 4/2 http://www.securitybalance.com/2009/04/mq-one-of-the-blind-spots/<br />
| + | |
− | Augusto Paes de Barros from the Security Balance blog posts about message queue security<br />
| + | '''Next Recording : Week of August 30, 2010. Day and Time TBD''' |
− | 4/3 http://i8jesus.com/?p=37<br />
| + | |
− | Arshan Dabirsiaghi posts on his blog about Browser scheme/slash quirks<br />
| + | Suggested Topics: |
− | 4/3 http://www.greebo.net/2009/04/04/owasp-eu-2009-coming-soon/<br />
| + | |
− | Andrew van der Stock warns that OWASP EU 2009 is coming soon!<br />
| + | # Is application security "a science" or a "hobby"? |
− | 4/7 http://michael-coates.blogspot.com/2009/04/ssl-whos-to-blame.html<br />
| + | # Do script kiddies, Ninjas, 3l1t3z, etc make a mockery of a serious business? |
− | Michael Coates talks about SSL and who is to blame: webites, browsers, or users?<br />
| + | # Is AppSec becoming a commodity service, what disciplines require skill and experience? |
− | 4/8 http://blog.portswigger.net/2009/04/using-burp-extender.html<br />
| + | # ? |
− | PortSwigger adds some interesting information about using the Burp Extender<br />
| + | # ? |
− | 4/9 http://michael-coates.blogspot.com/2009/04/universities-web-app-security.html<br />
| + | # ? |
− | Michael Coates asks the question, "[which] universities out there are offering classes which address web application security?"<br />
| |
− | 4/9 http://blogs.msdn.com/sdl/archive/2009/04/09/improving-security-with-url-rewriting.aspx<br />
| |
− | Bryan Sullivan talks about improving web application security with URL Rewriting<br />
| |
− | 4/12 http://aboulton.blogspot.com/2009/04/security-assessing-java-rmi-slides.html<br />
| |
− | Adam Boulton's OWASP presentation on Security Assessing Java RMI has been made available on his blog<br />
| |
− | 4/12 http://shiflett.org/blog/2009/apr/a-rev-canonical-http-header<br />
| |
− | Chris Shiflett sugggets #revcanonical HTTP Header<br />
| |
− | 4/16 http://www.informit.com/articles/article.aspx?p=1338343<br />
| |
− | http://www.cigital.com/justiceleague/2009/04/16/software-security-2008/<br />
| |
− | Gary McGraw uses statistics to show that Software Security has come of age<br />
| |
− | 4/17 http://research.zscaler.com/2009/04/we-used-to-laugh-at-xss.html<br />
| |
− | Michael Sutton discusses history of XSS from Defcon 10 (2002) to the present day (Twitter worm)<br />
| |
− | 4/17 http://jeremiahgrossman.blogspot.com/2009/04/software-security-grew-to-nearly-500m.html<br />
| |
− | Jeremiah uses McDonalds and Mortons as comparatives for black-box vs. white-box security testing<br />
| |
− | 4/17 http://jeremiahgrossman.blogspot.com/2009/04/website-threats-and-their-capabilities.html<br />
| |
− | OWASP Catalyst announced<br />
| |
− | 4/20 http://paco.to/?p=305<br />
| |
− | Paco lists 5 reasons for software certifications<br />
| |
− | 4/20 http://www.greensheet.com/newswire.php?newswire_id=11693<br />
| |
− | Qualys, Inc., the leading provider of on demand IT security risk and compliance management solutions, today announced QualysGuard(R) PCI Connect which is the industry's first Software-as-as-Service (SaaS) ecosystem for PCI compliance connecting merchants to multiple partners and security solutions in order to document and meet all 12 requirements for PCI DSS<br />
| |
− | 4/20 http://labs.securitycompass.com/index.php/2009/04/20/security-analysis-of-core-j2ee-design-patterns/<br />
| |
− | Rohit Sethi of SecurityCompass posts a blog post on a new Security Compass Labs blog about "Security Analysis of Core Java Enterprise Patterns"<br />
| |
− | 4/21 http://docs.google.com/Doc?id=dd7x5smw_16hdd34ggz<br/>
| |
− | mario heiderich posts some results of browser fuzzing on extraneous characters in tags<br/>
| |
− | 4/22 http://plynt.com/blog/2009/04/how-frequently-should-an-appli/<br />
| |
− | The Plynt blog asks the question, "How frequently shoud Applications be Tested?"<br />
| |
− | 4/24 http://www.owasp.org/index.php/Man_vs._Code<br />
| |
− | Mike Boberski of the OWASP ASVS Project posts a wiki article about using Notepad++ to syntax highlight PHP code<br />
| |
− | 4/25 http://shreeraj.blogspot.com/2009/04/web2proxy-beta-web-20-application-proxy.html<br />
| |
− | Shreeraj Shah releases a new tool, Web2Proxy, which is a Web 2.0 Application Proxy, Profiling, and Fuzzing Tool<br />
| |
− | 4/26 http://enablesecurity.com/2009/04/26/the-state-of-web-application-security-and-their-firewalls/<br />
| |
− | Wendel Guglielmetti Henrique from Trustwave and Sandro Gauchi of EnableSecurity spoke at TROOPERS09 in Munch about "The Truth of Web Application Firewalls: what the vendors do NOT want you to know"<br />
| |
− | 4/27 http://tacticalwebappsec.blogspot.com/2009/04/scanner-and-waf-data-sharing.html<br />
| |
− | Ryan Barnett gives guidance on how best to make VA+WAF work together<br />
| |