Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

Don’t Take Vulnerability Counts At Face Value

A posting from Dark Reading in there Vulnerability Management Section:  In 2012, there were 5,291 vulnerabilities documented by security researchers and software firms. Wait, no, make that 8,137. No, 9,184. Well, it could even be 8,168 or 5,281. In reality, the exact number of vulnerabilities reported in different databases each year varies widely–by as much […]

New OWASP Top 10 Reflects Unchanged State Of Web Security

A posting from Dark in there Application Security section: The oft-cited and oft-debated OWASP Top 10 list of the most critical vulnerabilities in Web applications got an update this week with the most prevalent flaw—injection–remaining at the number one slot. Injection, broken authentication and session management, cross-site scripting (XSS), insecure direct object references, security misconfiguration, […]

Don’t Take Vulnerability Counts At Face Value

A posting from Dark Reading in there Vulnerability Management Section:  In 2012, there were 5,291 vulnerabilities documented by security researchers and software firms. Wait, no, make that 8,137. No, 9,184. Well, it could even be 8,168 or 5,281. In reality, the exact number of vulnerabilities reported in different databases each year varies widely–by as much […]

New OWASP Top 10 Reflects Unchanged State Of Web Security

A posting from Dark in there Application Security section: The oft-cited and oft-debated OWASP Top 10 list of the most critical vulnerabilities in Web applications got an update this week with the most prevalent flaw—injection–remaining at the number one slot. Injection, broken authentication and session management, cross-site scripting (XSS), insecure direct object references, security misconfiguration, […]