Application Security: Roads to
Software Security Nirvana
Eoin Keary
• CTO BCCRISKADVISORY.COM
• OWASP GLOBAL BOARD MEMBER
• edgescan.com
Software Security Nirvana
4© 2012 WhiteHat Security, Inc.
HACKED
“(Cyber crime is the) second cause of economic crime experienced
by the financial services sector” – PwC
2012 Cyber Crime
• US $20.7 billion in direct losses
• Global $110 billion in direct losses
• Global $338 billion + downtime
“556 million adults across the world have first-hand experience of
cybercrime -- more than the entire population of the European
Union.”
Globally,
every
second, 18
adults
become
victims of
cybercrime
- Symantec
“The loss of industrial information and intellectual
property through cyber espionage constitutes the
greatest transfer of wealth in history” - Keith
Alexander
Almost 1 trillion USD was spent in
2012 protecting against cybercrime
Jimmy, I didn’t click it –
My Grandma
“One
hundred
BILLION
dollars” -
Dr Evil
Security is mostly a superstition. It does not
exist in nature, nor do the children of men as a
whole experience it. Avoiding danger is no
safer in the long run than outright exposure.
Life is either a daring adventure, or nothing.
-Helen Keller
Its (not) the $$$$
Information
security spend
Security incidents
(business impact)
But we are approaching this problem completely
wrong and have been for years…..
Problem # 1
Asymmetric Arms Race
A traditional end of cycle / Annual penetration
testing only gives minimal security…..
There are too many variables and too little time
to ensure “real security”.
• Code changes - possible introduction of vulnerabilities
• Framework vulnerabilities are discovered all the time
• Server/Hosting changes may give rise to a vulnerability
• Patching - vulnerability
• Logical/Business logic vulnerability - from new features
An inconvenient truth
Two weeks of
ethical hacking
Ten man-years of
development
Business
Logic Flaws
Code
Flaws
Security
Errors
Attacks Shift Towards Application Layer
V
"Risk comes from not knowing what you're
doing." - Warren Buffet
We know they are bad for us, but who cares, right?
If we eat too many we may get a heart attack? …sound familiar
We also write [in]secure code until we get hacked
The Cheeseburger approach: “Cheeseburger risk’ is the kind of risk you
deliberately take even knowing the consequences, until those consequences
actually come to pass.”
Cheeseburger Security
In two weeks:
Consultant “tune tools”
Use multiple tools – verify issues
Customize Attack Vectors to technology stack
Achieve 80-90 application functionality coverage
How experienced is the consultant?
Are they as good as the bad guys?
They certainly need to be, they only have 2 weeks, right!!?
Code may be pushed to live soon after the test.
Potential window of Exploitation could be until the next pen test.
6 mths, 9 mths, 1 year?
Automated Review
A fool with a tool, is still a fool”…..?
“We need an Onion”
SDL – Design review
Threat Modeling
Code review/SAST
Negative use/abuse cases/Fuzzing/DAST
Live/Ongoing - Continuous/Frequent monitoring / Testing
Manual Validation
Vulnerability management & Priority
Dependency Management ….
We need more than a Penetration test.
Large Trend towards services based Security & Vulnerability Management
All vulnerabilities are not equal:
Fixing “the right” vulns not all vulns
SDLC integration: Prevent Vs React – Cheese Burger Security
Security is changing….
From
– Securing mission
critical assets
– Point in time
Assessments
– Appliances/Software
licenses and staff to
manage perimeter
To
– Securing all assets
– Frequent scheduled
assessment of all assets
– SaaS Security –
Superior Accuracy.
Expert validation.
Fatal Flaw: “We only need to “do” security on important sites”
Make this more difficult: Lets change the application code once a month.
Continuous Security Assessment Approach
time
Problem # 2
You are what you eat
Software food chain
23
Application
Code
COTS
(Commercial off
the shelf
Outsourced
development Sub-
Contractors
Bespoke
outsourced
development
Bespoke Internal
development
Third Party
API’s
Third Party
Components
& Systems
Degrees of trust
You may not let some of the people who have developed your code into your offices!!
More Less
2012- Study of 31 popular open source libraries.
- 19.8 million (26%) of the library downloads
have known vulnerabilities.
- Today's applications may use up to 30 or more
libraries - 80% of the codebase
Spring - application development framework :
downloaded 18 million times by over 43,000
organizations in the last year. – Vulnerability:
Information leakage CVE-2011-2730
http://support.springsource.com/security/cve-2011-2730
In Apache CXF– application framework: 4.2
million downloads.- Vulnerability: high risk CVE-
2010-2076 & CVE 2012-0803
http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf
http://cxf.apache.org/cve-2012-0803.html
Problem # 3
Bite off more than we chew
How can we manage vulnerabilities on a large
scale….
Web security – application security roads to software security nirvana   iisf version
“We can’t improve what we can’t measure”
Say 300 web applications:
300 Annual Penetration tests
10’s of different penetration testers?
300 reports
How do we consume this Data?
Enterprise Security Intelligence:
Consolidation of vulnerability data.
Continuous active monitoring
Vulnerability Management solutions
Metrics: We can measure what problems we have
Measure: We cant improve what we cant measure
Priority: If we can measure we can prioritise
Delta: If we can measure we can detect change
Apply: We can apply our (small) budget on the right things
Improve: We can improve where it matters……
Value: Demonstrate value to our business
Answer the question: “Are we secure?” < a little better?
Problem # 4
Information flooding
(Melting a developers brain, White noise and
“compliance”)
Doing things right != Doing the right things.
“Not all bugs/vulnerabilities are equal”
(is HttpOnly important if there is no XSS?)
Contextualize Risk
(is XSS /SQLi always High Risk?)
Do developers need to fix everything?
- Limited time
- Finite Resources
- Task Priority
- Pass internal audit?
White Noise
Compliance
There’s Compliance:
EU directive:
http://register.consilium.europa.eu/pdf/en/12/st05/st05853.
en12.pdf
Article 23,24 & 79, - Administrative sanctions
“The supervisory authority shall impose a fine up to 250 000
EUR, or in case of an enterprise up to 0.5 % of its annual
worldwide turnover, to anyone who, intentionally or
negligently does not protect personal data”
Clear and Present Danger!!
…and there’s Compliance
Problem
Explain issues in “Developer speak” (AKA
English)
Is Cross-Site Scripting the same as SQL injection?
Both are injection attacks -> code and data
being confused by system.
LDAP Injection, Command Injection, Log Injection, XSS, SQLI etc etc
Think old phone systems, Captain Crunch (John Draper).
Signaling data and voice data on same logical connection – Phone Phreaking
XSS causes the browser to execute user
supplied input as code. The input breaks out of
the "Data" context and becomes execution
context.
SQLI causes the database or source code
calling the database to confuse data [context]
and ANSI SQL [ execution context].
Command injection mixes up data [context]
and the command [context].
So….
We need to understand what we are protecting against.
We need to understand that secure applications are in the hands of developers
You can only improve what you can measure
Not all bugs are created equal.
Bugs are Bugs. Explain security issues to developers in “Dev speak”
www.bccriskadvisory.com
© BCC Risk Advisory Ltd 2013 ..
All rights reserved.
Thanks for Listening
@eoinkeary
eoin@bccriskadvisory.com

More Related Content

PPTX
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
PPTX
Allianz Global CISO october-2015-draft
PPTX
Web security – everything we know is wrong cloud version
PPTX
The Future of Cybersecurity - October 2015
PPTX
We cant hack ourselves secure
PDF
Final presentation january iia cybersecurity securing your 2016 audit plan
PPT
The Changing Security Landscape
PPTX
Lessons Learned in Automated Decision Making / How to Delay Building Skynet
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
Allianz Global CISO october-2015-draft
Web security – everything we know is wrong cloud version
The Future of Cybersecurity - October 2015
We cant hack ourselves secure
Final presentation january iia cybersecurity securing your 2016 audit plan
The Changing Security Landscape
Lessons Learned in Automated Decision Making / How to Delay Building Skynet

What's hot (20)

PPTX
Art Hathaway - Artificial Intelligence - Real Threat Prevention
PPTX
Jack Whitsitt - Yours, Anecdotally
PDF
Whitepaper Avira about Artificial Intelligence to cyber security
PDF
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
PPTX
Valuing Data in the Age of Ransomware
PDF
Slide Griffin - Practical Attacks and Mitigations
PPTX
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
PPTX
Understanding Your Attack Surface and Detecting & Mitigating External Threats
PPTX
New Paradigms for the Next Era of Security
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
PDF
Combating Cyber Security Using Artificial Intelligence
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PPTX
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
PDF
How to Reduce the Attack Surface Created by Your Cyber-Tools
PDF
Cybersecurity | Risk. Impact. Innovations.
PPTX
Bob West - Educating the Board of Directors
PDF
Future of Cybersecurity 2016 - M.Rosenquist
PDF
Next-level mobile app security: A programmatic approach
PPT
Breaking down the cyber security framework closing critical it security gaps
PDF
Building secure mobile apps
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Jack Whitsitt - Yours, Anecdotally
Whitepaper Avira about Artificial Intelligence to cyber security
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Valuing Data in the Age of Ransomware
Slide Griffin - Practical Attacks and Mitigations
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Understanding Your Attack Surface and Detecting & Mitigating External Threats
New Paradigms for the Next Era of Security
The Cyber Security Landscape: An OurCrowd Briefing for Investors
Combating Cyber Security Using Artificial Intelligence
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
How to Reduce the Attack Surface Created by Your Cyber-Tools
Cybersecurity | Risk. Impact. Innovations.
Bob West - Educating the Board of Directors
Future of Cybersecurity 2016 - M.Rosenquist
Next-level mobile app security: A programmatic approach
Breaking down the cyber security framework closing critical it security gaps
Building secure mobile apps
Ad

Similar to Web security – application security roads to software security nirvana iisf version (20)

PPTX
Web security-–-everything-we-know-is-wrong-eoin-keary
PDF
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
PPT
Inconvenient Truth(s) - On Application Security (from 2007)
PDF
Cyber security for Developers
PPTX
Cybersecurity by the numbers
PDF
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
PPTX
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
PPTX
Threat Check for Struts Released, Equifax Breach Dominates News
PPTX
Solnet dev secops meetup
PPT
Making the case for sandbox v1.1 (SD Conference 2007)
PPTX
Online Gaming Cyber security and Threat Model
PPTX
Security in the age of open source - Myths and misperceptions
PDF
How to Audit
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
PPTX
PCM Vision 2019 Breakout: IBM | Red Hat
 
PDF
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
PPTX
Protect Yourself Against Today's Cybercriminals and Hackers
PPTX
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
PPTX
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
PDF
How Current Advanced Cyber Threats Transform Business Operation
Web security-–-everything-we-know-is-wrong-eoin-keary
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
Inconvenient Truth(s) - On Application Security (from 2007)
Cyber security for Developers
Cybersecurity by the numbers
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Threat Check for Struts Released, Equifax Breach Dominates News
Solnet dev secops meetup
Making the case for sandbox v1.1 (SD Conference 2007)
Online Gaming Cyber security and Threat Model
Security in the age of open source - Myths and misperceptions
How to Audit
Essentials of Web Application Security: what it is, why it matters and how to...
PCM Vision 2019 Breakout: IBM | Red Hat
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
Protect Yourself Against Today's Cybercriminals and Hackers
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
How Current Advanced Cyber Threats Transform Business Operation
Ad

More from Eoin Keary (20)

PPTX
IISF-March2023.pptx
PDF
Validation of vulnerabilities.pdf
PDF
Does a Hybrid model for vulnerability Management Make Sense.pdf
PDF
Edgescan 2022 Vulnerability Statistics Report
PPTX
Edgescan 2021 Vulnerability Stats Report
PPTX
One login enemy at the gates
PDF
Edgescan vulnerability stats report 2020
PDF
edgescan vulnerability stats report (2018)
PDF
edgescan vulnerability stats report (2019)
PPTX
Full stack vulnerability management at scale
PPTX
Vulnerability Intelligence - Standing Still in a world full of change
PPTX
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
PPTX
Hide and seek - Attack Surface Management and continuous assessment.
PPTX
Keeping the wolf from 1000 doors.
PPTX
Security by the numbers
PPTX
Ebu class edgescan-2017
PPTX
Vulnerability management and threat detection by the numbers
PPTX
14. html 5 security considerations
PPTX
04. xss and encoding
PPTX
03. sql and other injection module v17
IISF-March2023.pptx
Validation of vulnerabilities.pdf
Does a Hybrid model for vulnerability Management Make Sense.pdf
Edgescan 2022 Vulnerability Statistics Report
Edgescan 2021 Vulnerability Stats Report
One login enemy at the gates
Edgescan vulnerability stats report 2020
edgescan vulnerability stats report (2018)
edgescan vulnerability stats report (2019)
Full stack vulnerability management at scale
Vulnerability Intelligence - Standing Still in a world full of change
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Hide and seek - Attack Surface Management and continuous assessment.
Keeping the wolf from 1000 doors.
Security by the numbers
Ebu class edgescan-2017
Vulnerability management and threat detection by the numbers
14. html 5 security considerations
04. xss and encoding
03. sql and other injection module v17

Recently uploaded (20)

PPTX
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
PPTX
Introduction to networking local area networking
PPTX
c_languagew_structure_and_functions.pptx
PPTX
Data Flows presentation hubspot crm.pptx
PPTX
Networking2-LECTURE2 this is our lessons
PDF
Information Technology practical assignment
PPTX
WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx
PDF
AGENT SLOT TERPERCAYA INDONESIA – MAIN MUDAH, WD CEPAT, HANYA DI KANCA4D
PDF
Cybersecurity: Understanding Threats, Attacks, and Protective Measures in the...
PPT
chapter 5: system unit computing essentials
PDF
Technical SEO Explained: How To Make Your Website Search-Friendly
PPT
Comparison of 2 Population Kuch toh bhadwa chodi karwa raha
PPTX
BIOS-and-VDU-The-Foundations-of-Computer-Startup-and-Display (1).pptx
PPTX
IOT LECTURE IOT LECTURE IOT LECTURE IOT LECTURE
PPTX
Basic_of_Computer_System.pptx class-8 com
PPTX
Introduction: Living in the IT ERA.pptx
PPTX
Dating App Development Cost: Factors, Features & Estimates
PDF
JuanConnect E-Wallet Guide for new users.pdf
PDF
Tailieuhoctiengnhat.com__(N5) 1021 từ vựng tổng hợp.pdf
PDF
Toolkit of the MultiCloud DevOps Professional.pdf
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
Introduction to networking local area networking
c_languagew_structure_and_functions.pptx
Data Flows presentation hubspot crm.pptx
Networking2-LECTURE2 this is our lessons
Information Technology practical assignment
WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx
AGENT SLOT TERPERCAYA INDONESIA – MAIN MUDAH, WD CEPAT, HANYA DI KANCA4D
Cybersecurity: Understanding Threats, Attacks, and Protective Measures in the...
chapter 5: system unit computing essentials
Technical SEO Explained: How To Make Your Website Search-Friendly
Comparison of 2 Population Kuch toh bhadwa chodi karwa raha
BIOS-and-VDU-The-Foundations-of-Computer-Startup-and-Display (1).pptx
IOT LECTURE IOT LECTURE IOT LECTURE IOT LECTURE
Basic_of_Computer_System.pptx class-8 com
Introduction: Living in the IT ERA.pptx
Dating App Development Cost: Factors, Features & Estimates
JuanConnect E-Wallet Guide for new users.pdf
Tailieuhoctiengnhat.com__(N5) 1021 từ vựng tổng hợp.pdf
Toolkit of the MultiCloud DevOps Professional.pdf

Web security – application security roads to software security nirvana iisf version

  • 1. Application Security: Roads to Software Security Nirvana
  • 2. Eoin Keary • CTO BCCRISKADVISORY.COM • OWASP GLOBAL BOARD MEMBER • edgescan.com
  • 4. 4© 2012 WhiteHat Security, Inc. HACKED
  • 5. “(Cyber crime is the) second cause of economic crime experienced by the financial services sector” – PwC 2012 Cyber Crime • US $20.7 billion in direct losses • Global $110 billion in direct losses • Global $338 billion + downtime “556 million adults across the world have first-hand experience of cybercrime -- more than the entire population of the European Union.” Globally, every second, 18 adults become victims of cybercrime - Symantec “The loss of industrial information and intellectual property through cyber espionage constitutes the greatest transfer of wealth in history” - Keith Alexander Almost 1 trillion USD was spent in 2012 protecting against cybercrime Jimmy, I didn’t click it – My Grandma “One hundred BILLION dollars” - Dr Evil
  • 6. Security is mostly a superstition. It does not exist in nature, nor do the children of men as a whole experience it. Avoiding danger is no safer in the long run than outright exposure. Life is either a daring adventure, or nothing. -Helen Keller
  • 7. Its (not) the $$$$ Information security spend Security incidents (business impact)
  • 8. But we are approaching this problem completely wrong and have been for years…..
  • 10. A traditional end of cycle / Annual penetration testing only gives minimal security…..
  • 11. There are too many variables and too little time to ensure “real security”. • Code changes - possible introduction of vulnerabilities • Framework vulnerabilities are discovered all the time • Server/Hosting changes may give rise to a vulnerability • Patching - vulnerability • Logical/Business logic vulnerability - from new features
  • 12. An inconvenient truth Two weeks of ethical hacking Ten man-years of development Business Logic Flaws Code Flaws Security Errors
  • 13. Attacks Shift Towards Application Layer V
  • 14. "Risk comes from not knowing what you're doing." - Warren Buffet
  • 15. We know they are bad for us, but who cares, right? If we eat too many we may get a heart attack? …sound familiar We also write [in]secure code until we get hacked The Cheeseburger approach: “Cheeseburger risk’ is the kind of risk you deliberately take even knowing the consequences, until those consequences actually come to pass.” Cheeseburger Security
  • 16. In two weeks: Consultant “tune tools” Use multiple tools – verify issues Customize Attack Vectors to technology stack Achieve 80-90 application functionality coverage How experienced is the consultant? Are they as good as the bad guys? They certainly need to be, they only have 2 weeks, right!!? Code may be pushed to live soon after the test. Potential window of Exploitation could be until the next pen test. 6 mths, 9 mths, 1 year? Automated Review A fool with a tool, is still a fool”…..?
  • 17. “We need an Onion” SDL – Design review Threat Modeling Code review/SAST Negative use/abuse cases/Fuzzing/DAST Live/Ongoing - Continuous/Frequent monitoring / Testing Manual Validation Vulnerability management & Priority Dependency Management …. We need more than a Penetration test.
  • 18. Large Trend towards services based Security & Vulnerability Management All vulnerabilities are not equal: Fixing “the right” vulns not all vulns SDLC integration: Prevent Vs React – Cheese Burger Security
  • 19. Security is changing…. From – Securing mission critical assets – Point in time Assessments – Appliances/Software licenses and staff to manage perimeter To – Securing all assets – Frequent scheduled assessment of all assets – SaaS Security – Superior Accuracy. Expert validation. Fatal Flaw: “We only need to “do” security on important sites”
  • 20. Make this more difficult: Lets change the application code once a month.
  • 22. Problem # 2 You are what you eat
  • 23. Software food chain 23 Application Code COTS (Commercial off the shelf Outsourced development Sub- Contractors Bespoke outsourced development Bespoke Internal development Third Party API’s Third Party Components & Systems Degrees of trust You may not let some of the people who have developed your code into your offices!! More Less
  • 24. 2012- Study of 31 popular open source libraries. - 19.8 million (26%) of the library downloads have known vulnerabilities. - Today's applications may use up to 30 or more libraries - 80% of the codebase
  • 25. Spring - application development framework : downloaded 18 million times by over 43,000 organizations in the last year. – Vulnerability: Information leakage CVE-2011-2730 http://support.springsource.com/security/cve-2011-2730 In Apache CXF– application framework: 4.2 million downloads.- Vulnerability: high risk CVE- 2010-2076 & CVE 2012-0803 http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf http://cxf.apache.org/cve-2012-0803.html
  • 26. Problem # 3 Bite off more than we chew
  • 27. How can we manage vulnerabilities on a large scale….
  • 29. “We can’t improve what we can’t measure”
  • 30. Say 300 web applications: 300 Annual Penetration tests 10’s of different penetration testers? 300 reports How do we consume this Data?
  • 31. Enterprise Security Intelligence: Consolidation of vulnerability data. Continuous active monitoring Vulnerability Management solutions
  • 32. Metrics: We can measure what problems we have Measure: We cant improve what we cant measure Priority: If we can measure we can prioritise Delta: If we can measure we can detect change Apply: We can apply our (small) budget on the right things Improve: We can improve where it matters…… Value: Demonstrate value to our business Answer the question: “Are we secure?” < a little better?
  • 33. Problem # 4 Information flooding (Melting a developers brain, White noise and “compliance”)
  • 34. Doing things right != Doing the right things. “Not all bugs/vulnerabilities are equal” (is HttpOnly important if there is no XSS?) Contextualize Risk (is XSS /SQLi always High Risk?) Do developers need to fix everything? - Limited time - Finite Resources - Task Priority - Pass internal audit? White Noise
  • 35. Compliance There’s Compliance: EU directive: http://register.consilium.europa.eu/pdf/en/12/st05/st05853. en12.pdf Article 23,24 & 79, - Administrative sanctions “The supervisory authority shall impose a fine up to 250 000 EUR, or in case of an enterprise up to 0.5 % of its annual worldwide turnover, to anyone who, intentionally or negligently does not protect personal data”
  • 36. Clear and Present Danger!! …and there’s Compliance
  • 37. Problem Explain issues in “Developer speak” (AKA English)
  • 38. Is Cross-Site Scripting the same as SQL injection? Both are injection attacks -> code and data being confused by system. LDAP Injection, Command Injection, Log Injection, XSS, SQLI etc etc Think old phone systems, Captain Crunch (John Draper). Signaling data and voice data on same logical connection – Phone Phreaking
  • 39. XSS causes the browser to execute user supplied input as code. The input breaks out of the "Data" context and becomes execution context. SQLI causes the database or source code calling the database to confuse data [context] and ANSI SQL [ execution context]. Command injection mixes up data [context] and the command [context].
  • 40. So…. We need to understand what we are protecting against. We need to understand that secure applications are in the hands of developers You can only improve what you can measure Not all bugs are created equal. Bugs are Bugs. Explain security issues to developers in “Dev speak”
  • 41. www.bccriskadvisory.com © BCC Risk Advisory Ltd 2013 .. All rights reserved. Thanks for Listening @eoinkeary [email protected]