This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Newsletter 7"

From OWASP
Jump to: navigation, search
Line 36: Line 36:
  
 
At this event, the fifth annual, Joel Stanley of Resource Interactive, in Columbus, OH, will share his experiences in maintaining applications with user bases as large as 15+ million.  He'll explore how to utilize standards by which application security and vulnerability can be judged. Join hundreds of your IT professional peers in this and your choices of thirty-four other sessions in seven tracks at this day long event that costs only $35 (including your lunch!).  Ben Forta, Chief Product Evangelist of Adobe Systems will be giving the Key Note presentation, plus Ben will be back to give a presentation at the Lunchtime Session as well. Visit [http://www.sbconference.com http://www.sbconference.com] for all the details and to register online!
 
At this event, the fifth annual, Joel Stanley of Resource Interactive, in Columbus, OH, will share his experiences in maintaining applications with user bases as large as 15+ million.  He'll explore how to utilize standards by which application security and vulnerability can be judged. Join hundreds of your IT professional peers in this and your choices of thirty-four other sessions in seven tracks at this day long event that costs only $35 (including your lunch!).  Ben Forta, Chief Product Evangelist of Adobe Systems will be giving the Key Note presentation, plus Ben will be back to give a presentation at the Lunchtime Session as well. Visit [http://www.sbconference.com http://www.sbconference.com] for all the details and to register online!
 +
 +
== Featured Item: WASC Threat Classification Project - Call for Participants ==
 +
 +
The WASC Threat Classification Project is seeking people to contribute towards The Threat Classification Version 2.0. Time has passed since the initial TC release, and it's important to keep this widely utilized document up to date.
 +
 +
Project Homepage: http://www.webappsec.org/projects/threat/
 +
 +
Interested participants can contact 'contact_@_webappsec.org' with any questions.
  
 
== Latest additions to the WIKI ==
 
== Latest additions to the WIKI ==
 
  
 
==== New Pages====
 
==== New Pages====
Line 61: Line 68:
 
* [[Ajax and Other "Rich" Interface Technologies]]
 
* [[Ajax and Other "Rich" Interface Technologies]]
 
* [[Testing for business logic]]
 
* [[Testing for business logic]]
* [[Category:OWASP SWAAT Project]]
+
* [[:Category:OWASP SWAAT Project]]
 
* [[Preventing SQL Injection in Java]]
 
* [[Preventing SQL Injection in Java]]
* [[Category:OWASP WebGoat Project]]
+
* [[:Category:OWASP WebGoat Project]]
 
* [[6th OWASP AppSec Conference - Italy 2007]]
 
* [[6th OWASP AppSec Conference - Italy 2007]]
 
* [[OWASP Java Table of Contents]]
 
* [[OWASP Java Table of Contents]]
Line 89: Line 96:
  
 
==== OWASP Community====
 
==== OWASP Community====
* tbd
+
* Apr 17 (18:00h) - [[Rochester|Rochester chapter meeting]]
 
+
* Apr 12 (18:00h) - [[Netherlands|Netherlands chapter meeting]]
==== Application Security News ====
+
* Apr 11 (18:00h) - [[Toronto|Toronto chapter meeting]]
* tbd
+
* Apr 10 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]
 +
* Apr 4 (18:30h) - [[Boston|Boston chapter meeting]]
 +
* Apr 3 (18:00h) - [[Melbourne|Melbourne chapter meeting]]
 +
* Mar 28 (11:30h) - [[San Antonio|San Antonio chapter meeting]]
 +
* Mar 22 (18:00h) - [[London|London chapter meeting]]
 +
* Mar 21-22 - [[Belgium#OWASP_Top_10_2007_Update_.28Infosecurity_Belgium.2C_21_.26_.2622_Mar_2007.29|Belgium@InfoSecurity]]
 +
* Mar 20 (18:00h) - [[Rochester|Rochester chapter meeting]]
 +
* Mar 14 (18:00h) - [[Toronto|Toronto chapter meeting]]
 +
* Mar 14 (18:00h) - [[Chicago|Chicago chapter meeting]]
 +
* Mar 13 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]
  
 
== OWASP references in the Media==
 
== OWASP references in the Media==
* tbd
+
* [http://www.net-security.org/secworld.php?id=4882 SPI Dynamics, Inc. Joins OWASP as Vendor Organization Member]

Revision as of 10:01, 12 March 2007

Sent to owasp-all mailing list on ?? Mar 2007

OWASP Newsletter #7 (?-Mar-2007)

Welcome to the 7th OWASP Newsletter, stuffed with the latest OWASP and Web Application Security updates.

If you have any content to add to the next edition, feel free to add it directly to its WIKI page (OWASP Newsletter 8).

As Dinis is very busy this week, I helped him out with this Newsletter.

Sebastien Deleersnyder

Belgium Chapter Leader

Featured Item: OWASP Chapters

Currently there are over 80 OWASP chapters world wide! The OWASP chapters program helps to foster local discussion of application security around the world. Our local chapters are free and open to anyone. Check out the chapters page to locate a chapter near you or start a new chapter.

There are a lot of resources available for all chapters: The Chapter Rules, the OWASP Chapter Leader Handbook and if you are short of local chapter material, we have started to make available presentations in the monthly Chapter Presentation Bundles.

An extra call for action towards the OWASP (chapter) leaders: If you are in other countries/cities and you would like to participate in a local chapter meeting, do not hesitate to contact the local chapter leader!

Also have a look at the great Phoenix/Tools page, created by the Phoenix chapter.

Featured Project: OWASP SWAAT Project

SWAAT is a free web application source code analysis tool. SWAAT searches through source code and analyzes against the database of potentially dangerous strings given in the .xml files. Thus it does NOT positively identify the existence of a vulnerability - this generally requires application contextual knowledge. It identifies the usage of functions / strings / SQL that could lead to a finding. All potentially dangerous code references are included in the output report.

Future releases of SWAAT will include:

  • a graphical user interface (GUI)
  • integrated development environment (IDE) plug-ins
  • more sophisticated functionality and logic (for example to work with .java source)

SWAAT was generously donated by Security Compass

Featured Event: Application Security Track at Spring <br /> Conference 2007 (Athens, OH Mar-22)

Harden web applications against the OWASP "Top 10 Threats"! The Spring <br /> Conference 2007 is held on Thursday, March 22, 2007 on the campus of Ohio University in Athens, Ohio. They have a dedicated Application Security track and more in this day long event that has been described as, "one of the best kept secrets in Information Technology!".

At this event, the fifth annual, Joel Stanley of Resource Interactive, in Columbus, OH, will share his experiences in maintaining applications with user bases as large as 15+ million. He'll explore how to utilize standards by which application security and vulnerability can be judged. Join hundreds of your IT professional peers in this and your choices of thirty-four other sessions in seven tracks at this day long event that costs only $35 (including your lunch!). Ben Forta, Chief Product Evangelist of Adobe Systems will be giving the Key Note presentation, plus Ben will be back to give a presentation at the Lunchtime Session as well. Visit http://www.sbconference.com for all the details and to register online!

Featured Item: WASC Threat Classification Project - Call for Participants

The WASC Threat Classification Project is seeking people to contribute towards The Threat Classification Version 2.0. Time has passed since the initial TC release, and it's important to keep this widely utilized document up to date.

Project Homepage: http://www.webappsec.org/projects/threat/

Interested participants can contact 'contact_@_webappsec.org' with any questions.

Latest additions to the WIKI

New Pages

Updated pages

Updated chapter pages:

Other pages:

New Documents & Presentations from chapters

For a complete list of chapter presentations see the online table of presentations.

Latest Blog entries

OWASP Community

OWASP references in the Media