This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Podcast 62

From OWASP
Jump to: navigation, search

OWASP Podcast Series #62

OWASP Interview with Amichai Shulman
Published March 12, 2010

itunes.jpg Feed-icon-32x32.pngmp3

Participants

  • Amichai Shulman is the CTO of Imperva.

Questions

  1. Why are SQL injection attacks still prevailing?
  2. Are XSS attacks for real?
  3. What kind of hacking activity is there in reality?
  4. Organizations often have many different kind of applications, how do you account for the many different varieties of traffic?
  5. Some say that WAF's generate a large amount of false positives. How do operators manage this information?
  6. I think that insider threats and APT (Advanced Persistent Threats) are a real concern. Attackers are getting better? Do WAF's really help us from that kind of threat?
  7. WAF's are pretty powerful devices. Can a WAF deployment be done incorrectly so that it could actually increase risk? I would think that if an attacker could take over a WAF it could be a good jumping off point to launch other attacks from inside the network depending on how it is deployed.
  8. Why go commercial? There are more and more open source solutions for WAF technology.
  9. Can WAF's help us at the INTEGRATION tier level? i.e. Web Services, Ajax Proxies, communication to non-Web Services such as LDAP/AD, SMTP, SNMP, NTP, DNS
  10. We see the move towards a WAF (or other firewall) between every layer (defense in depth). Doesn't this get expensive?
  11. Do you have any stats on (1) Cost to fix bug before release: (2) Cost to fix bug after release vs (3) Cost to bolt-on a WAF?
  12. The industry has struggled to secure client to website traffic. Now that the web is moving to API to API, wrapping up chaotic distributed systems as 'the cloud' and then having data pass in promiscuous fashion between them all.... what do you think the future is for our industry?