This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

File:20151014-Application Security Testing by Static Code Analysis-blitzfranklyn.pdf

From OWASP
Revision as of 12:12, 21 October 2015 by Schattenbaum (talk | contribs) (Application security is in the focus of attention in a world where digitization is becoming one of the key business success factor and where current breaches show that companies face serious threats from professional hackers. For security professionals...)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Application security is in the focus of attention in a world where digitization is becoming one of the key business success factor and where current breaches show that companies face serious threats from professional hackers. For security professionals nowadays to secure their networks and applications there is available a broad arsenal of technologies like web application firewalls, intrusion detection systems, data leakage preventions and so forth. While these technologies assume that underlying applications might be vulnerable, we believe that we need to bring security inside our assets: The source code. This is why we at Swisscom execute security measures inside the software development pipeline as early as the first line of code has been written. Automated Application Security Testing in a white box fashion on source code level with direct feedback to the developer. Like this we are securing our applications as early as it gets in the lifecycle, much before they go into production.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current12:12, 21 October 2015 (627 KB)Schattenbaum (talk | contribs)Application security is in the focus of attention in a world where digitization is becoming one of the key business success factor and where current breaches show that companies face serious threats from professional hackers. For security professionals...
  • You cannot overwrite this file.

There are no pages that link to this file.