In this episode I talk about assigning responsibility for secure development and how the dev and security teams should be working together to accomplish a common goal.
I also discuss the importance of updating developer job descriptions and creating an expectation around developers having secure development experience.
For more info go to https://www.developsec.com or follow us on X (@developsec).
In this episode I talk about the evolving world of ransomware. I discuss a few examples of unique tactics the malicious actors are using to put pressure on organizations to pay the ransom.
Referenced Articles:
https://www.theregister.com/AMP/2024/04/30/finnish_psychotherapy_center_crook_sentenced/
https://www.darkreading.com/cyber-risk/hackers-weaponize-sec-disclosure-rules-against-corporate-targets
https://www.theregister.com/2024/01/05/swatting_extorion_tactics/
For more info go to https://www.developsec.com or follow us on X (@developsec).
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode we talk about addressing the root cause of an issue versus the symptoms. How can the process of keeping application components updated be improved?
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
Transcript:
In this episode, James talks about root cause analysis versus treating the symptoms.
Tackling the challenge to integrate security into the development process, looking for insights, answers and practical solutions to avoid getting overwhelmed. Welcome to the develop SEC podcast where our focus is your success in securing and improving development processes. And here's your host, James Jardine. Hey, everyone, welcome back to the show. Today, I want to talk about addressing the symptoms versus addressing the root problem. And I think in application security, or when we talk about secure development, this is something where a lot of times we address the symptoms, but we never really take the step back to address the actual root cause of what's causing those symptoms. And today, I want to actually talk about vulnerable third party components. This is something that has been kind of brought to the attention a lot more in the past few years, made it into the OWASP, top 10. And it's something I think everybody struggles with, we never know when we'll have a vulnerable third party component, because until somebody actually identifies a vulnerability, we just assume that we're good. And then on top of that, if there is a vulnerability identified, then we also run the chances that we're probably not even using that feature.
So vulnerable third party components are a really interesting aspect, when we think about secure development. Because there is a lot of unknowns, we may know that there's a vulnerability there. But the actual knowledge of do we use that piece and are we vulnerable, can be difficult, which, in the end, ends up adding a whole bunch of extra work and a whole lot of time for us to try to figure this out and address this stuff. And so this is where I talk about addressing the symptoms. In this case, in a lot of places, what we do is we address that symptom, we know that there's an issue of vulnerable third party components, right, that's the symptom, we have a vulnerable third party component. And so most places have some sort of process in place where we're going to identify these right, we're going to scan them all the time, whether using some of the common commercial tools, maybe you're using a free open source tool. But basically, the way it goes is I'm going to scan my repos or I'm going to scan my packages, and I'm going to look for all the dependencies, and then I'll look at their dependencies, and we'll see if there's any known vulnerable components within these right. And that requires having some sort of CVE out there that says, hey, somebody has found this, they've reported it, I remember requiring this to be a rep
In this episode we talk about the spell check feature of the browser and how it could present a risk to sensitive data.
Link to article referenced: https://www.darkreading.com/application-security/spellchecking-google-chrome-microsoft-edge-browsers-leaks-passwords
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
Log4J has been the talk of the town recently and everyone is focused on the technical details of the specific vulnerabilities found. In this episode, James talks about the overarching ideas around dealing with vulnerable components. Are you vulnerable? If so, what needs to be done?
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security training to add value to your application security program. Contact us today to see how we can help.
Chrome has announced a few changes that we need to watch out for in the near future. We previously talked about the default value for samesite that is coming up fast. I wrote about this here: https://www.jardinesoftware.net/2019/10/28/samesite-by-default-in-2020/
Also, they are getting ready to start blocking mixed content downloads:
https://blog.chromium.org/2020/02/protecting-users-from-insecure.html
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security training to add value to your application security program. Contact us today to see how we can help.
It was recently announced that Chrome was dropping the XSS Auditor in Chrome 78. What does that mean and how does that change things for you as a developer?
https://www.chromium.org/developers/design-documents/xss-auditor
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security training to add value to your application security program. Contact us today to see how we can help.
In 2020, Chrome will default the SameSite attribute to Lax on all cookies. SameSite helps mitigate CSRF, but does that mean CSRF is Dead?
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security training to add value to your application security program. Contact us today to see how we can help.
In this episode, James talks about investing in the development teams to increase application security priorities.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security training to add value to your application security program. Contact us today to see how we can help.
In this episode, James talks about some of the risks and recommendations around security questions and their implementation.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
Does your application give away details about it server, framework, or other components? How is this information used by an attacker? Check out this episode to learn more.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
Would you know if someone authenticated to your account? With the breaches we see in the news, and attacks like credential stuffing, there must be a way to be alerted to account access. James talks about authentication alerts, what they are, and why you may want to use them.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
James discusses how implementation matters with security controls and how it changes priorities. This came about after reading the following story:
https://www.theverge.com/2018/12/31/18162541/vein-authentication-wax-hand-hack-starbug
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
I talk about some of what happened in 2018 and what I am looking to do in 2019. I also ask you to think about your previous year and goals. I also talk about some new training I am providing.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode James talk about the Dunkin Donuts Perks breach. This is an interesting situation as the accounts were access using the victim's username and password found from another data breach. The issue: Password Reuse. Could D&D have prevented this? Listen in to hear my thoughts. Please feel free to share your thoughts as well.
Article from Today: https://www.today.com/food/dunkin-reveals-security-breach-here-s-what-it-may-mean-t144139
Dunkin Donuts Release: https://www.dunkindonuts.com/content/dam/dd/pdf/Security_Update.pdf
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode James talks about what credential stuffing is, how if affects your apps, and how you can look to defend against it.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
James talks about the Facebook breach and shares some insights into how you can take steps to prevent this type of incident in your applications.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
I sit down with Eric Johnson to talk about security in the IDE and other fun topics. A bit longer than usual, but full of great information.
You can reach out to Eric on twitter @emjohn20 or check out his site at https://www.pumascan.com.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
James sits down with Julien Vehent to discuss his new book "Securing DevOps" and talk about security in a devOps world.
Julien (@jvehent) is a security architect and engineering manager with over 15 years of experience in large organizations and web companies. He is currently responsible for the operational security of Firefox's backend infrastructure at Mozilla, and is the author of Securing DevOps.
Check out the book (Securing DevOps) at https://www.manning.com/books/securing-devops
Special 40% discount code for Developsec listeners: poddevelopsec18
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
The headlines are filled with credential breaches. One way to avoid being those headlines is to not store credentials. Instead, use a 3rd party to authenticate your users. While this cuts a lot of work out of your development time, it is important to understand the pros and cons to each method. James talks through some of these risks to help better understand which method might be right for you.
Links from show:
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode James introduces us to the idea of web security policies stored in a security.txt file. We have talked about vulnerability disclosure before and this ties directly into that conversation.
Link to Draft: https://tools.ietf.org/html/draft-foudil-securitytxt-03
Link to form to create the file: https://securitytxt.org/
Link to our blog post: https://www.developsec.com/2018/06/26/overview-of-web-security-policies/
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode, James shares a story of learning from a mistake and how we can't be right every time. Hear what he learned and how you can learn too.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode we talk about choosing the right security tools for your environment. There are lots of vendors offering solutions to help identify security issues within our applications. The trick is to learn to identify which ones make the most sense for your environment.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode, James talks about what it means to shift left in the SDLC.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode we talk about efail and the HYPE around security news.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
** Check out our new Live Fundamentals of Application Security training starting on May 1, 2018. Don't wait to sign up. For schedules and information check out https://www.jardinesoftware.com/fundamentals-of-application-security/ **
In this episode, James shares his thoughts on an interesting scam potential was brought up regarding Gmail and Netflix. A lot of the discussion is on a unique Gmail feature most haven't heard of. James breaks this down in this episode.
The original story was shared at
https://www.theregister.co.uk/2018/04/10/gmail_netflix_phishing_vector/
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode we talk about treating security flaws as defects and embedded vs. built-in security. Do you treat security flaws differently? What barriers does that create?
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode we talk about the MyFitnessPal breach and some of the key points that we as developers, security, and users can take away from it.
Tweet with Graph of Largest Breaches mentioned: https://twitter.com/EricTopol/status/979556839015661568
Link to article about the breach: https://www.cnet.com/news/millions-of-myfitnesspal-accounts-hacked-under-armour-says/
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode we talk about penetration testing and what you need to know to get the most out of the activity. Tune in to hear some of our thoughts on the topic.
To take the training course survey go to https://forms.office.com/Pages/ResponsePage.aspx?id=dUTTGKfrY0SMJRLyejG00DrfDtlb8W5HpqoXHgPDektUNDgxVU9SNlVRNVhXMTY4UUxSU041MFVWTC4u
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode we talk about secure code review with a mention of static analysis. Do you know the difference? What is the issue of doing one over the other, or just outright replacing actual code review with static analysis? Tune in to hear some of our thoughts on the topic.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode James talks about 2-factor authentication, why we use it, and maybe why we don't. Is your 2-factor implementation getting in your way?
The DevelopSec YouTube Channel - https://www.youtube.com/channel/UCdAqgfdGs0-hPa8FhsODwNw
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
The new OWASP Top 10 2017 is out. We look at some of the changes and how you can effectively use the list to better your security program.
We are also launching a new DevelopSec Live broadcast. To check out the first episode, go to https://www.youtube.com/watch?v=kfDuxwFScOE
(The first 2 minutes are just a place holder as I was starting, feel free to skip those. That will go away in future episodes).
The DevelopSec YouTube Channel - https://www.youtube.com/channel/UCdAqgfdGs0-hPa8FhsODwNw
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
James sits down with Perry Krug, from Couchbase to discuss some important steps to take to secure your database.
Perry Krug - https://twitter.com/perrykrug
Couchbase - https://twitter.com/couchbase
Couchbase - https://www.couchbase.com/
CouchbaseSecurity Documents - https://developer.couchbase.com/documentation/server/current/security/security-intro.html
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
Welcome to 2018! Another year down and time for many of us to start making promises to ourselves of things we will start doing in this new year. In this episode James talks about some lessons we should take from 2017 and ways to use them in 2018.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode, James talks with Tim Medin regarding Meteor and security. If you develop with Meteor or have to test it, there is a lot of information packed in.
More about Tim Medin (@timmedin):
Red Seige website - https://www.redsiege.com/
Link to Meteor Minor and other tools Tim mentioned:
https://github.com/nidem
Tim Medin's Bsides Orlando 2017 Presentation - Tim Medin - Mining Meteor B-Sides Orlando 2017
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
You have heard about the Apple Sign-in Bug on High Sierra. Now lets talk about how we can use this example to better our current development processes to protect ourselves.
Link to mentioned article: https://www.theguardian.com/technology/2017/nov/30/apple-macos-high-sierra-fix-breaks-file-sharing-password-security-flaw-emergency-patch
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode, James talks the use of 3rd party components and how to handle determining if they are vulnerable or not.
Links:
OWASP Dependancy Check - https://www.owasp.org/index.php/OWASP_Dependency_Check
GitHub Blog - https://github.com/blog/2470-introducing-security-alerts-on-github
RetireJS - https://retirejs.github.io/retire.js/
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode, James talks about open redirect and why it matters from a security perspective. He also shows how this information can be used in your personal technology use, not just in development.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
You know your development language and platform, but do you really know the ins and outs of web application technology? How well do you know HTTP, HTML, etc? James talks about a few scenarios where really understanding how the technologies works helps better understand vulnerability risks.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode, James talks about authorization and some common areas where it poses a risk. He also goes over some techniques to help test authorization.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
The Equifax breach was a major news story. James talks about some of the security controls mentioned and how to start a conversation within your organization about them.
Want to listen on YouTube? Check out our channel where we are releasing episodes starting from episode 1 at https://www.youtube.com/channel/UCdAqgfdGs0-hPa8FhsODwNw
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
We talk about cross-site scripting (XSS) all the time, but often overlook the ability to use javascript: in anchor tags. James talks about this unique ability and how to protect your applications from it.
The related blog post for this can be found at https://www.developsec.com/2017/09/06/javascript-in-an-href-or-src-attribute/
Want to listen on YouTube? Check out our channel where we are releasing episodes starting from episode 1 at https://www.youtube.com/channel/UCdAqgfdGs0-hPa8FhsODwNw
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
We use a lot of platforms and frameworks when we develop an application. These platforms may provide security features, but do you know which ones? James talks about the importance of understanding your platforms and what to consider.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
James talks about the risk of USB thumb drives and their risk using the recent BCBS marketing campaign as an example. (http://www.fiercehealthcare.com/privacy-security/bcbs-alabama-re-evaluates-usb-marketing-campaign-amid-security-concerns).
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact ustoday to see how we can help.
James talks about a recent vulnerability report regarding MySpace's Account Recovery system (https://www.wired.com/story/myspace-security-account-takeover/). He talks about considerations around account recovery and the need to revisit this type of functionality on a regular basis.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact ustoday to see how we can help.
In this episode, James talks about Interactive Application Security Testing, or IAST. It is a sort of hybrid approach that is similar to both dynamic and static analysis. Listen in to learn more about it.
The video version of this can be found at https://youtu.be/KHSlDletm9I
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
Are you thinking about client vs. server-side input validation? Curious why each is important and when to use them? James talks about the basic concepts and how to apply them to create more secure applications.
A video version of this podcast is now available at: https://youtu.be/irO1TOC6-i8
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode I sit down with Geurt van Wijk from IDdriven to discuss IAM and IDaaS. Geurt has many years of experience around Identity and shares some great insights into considerations when working with it. If you typically think of Identity as just a user with credentials and some typical roles, you will want to listen in.
You can get more information about IDdrive from https://www.iddriven.com
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@developsec.com for an invitation.
DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
It was recently reported that an audio driver on HP systems was logging key strokes to a local file. Accidental? Malicious? Instead, we talk about how to try and avoid this from happening in the future.
Original Article: https://www.cnet.com/news/keylogger-discovered-on-some-hp-laptops-conexant/
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@jardinesoftware for an invitation.
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact ustoday to see how we can help. Check out our 30 day advantage.
I sat down with Vittorio Bertocci from Microsoft at the Microsoft Build 2017 conference in Seattle Washington. Vittorio shared some great insights into Identity and some new things around Azure AD and Azure AD B2C. Listen in to learn more about some of the interesting things going on.
You can watch Vittorio's presentation from build at: https://channel9.msdn.com/Events/Build/2017/B8084
To get more information from Vittorio, you can follow him on twitter at @vibronet or check out his website at www.cloudidentity.com
Also, check out this announcement about new authentication SDKs: https://azure.microsoft.com/en-us/blog/start-writing-applications-today-with-the-new-microsoft-authentication-sdks/
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@jardinesoftware for an invitation.
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact ustoday to see how we can help. Check out our 30 day advantage.
Over the years I have had many people ask about encoding before storing data in the database. Here are my thoughts and recommendations.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@jardinesoftware for an invitation.
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Do you use hosted content on a CDN? How do you know the file hasn't been modified? James describes Sub Resource Integrity and how it is used to help detect and prevent loading modified files. For details referenced in the show about commands and examples, check out our post at https://www.developsec.com/2017/04/16/sub-resource-integrity-sri/
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@jardinesoftware for an invitation.
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Do you struggle with trying to pick the most secure application platform? Are you focusing on the right questions? James talks about ways to look at application platforms and be secure, no matter which one you choose.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Join the conversations.. join our slack channel. Email james@jardinesoftware for an invitation.
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Do you allow users to login into their accounts across multiple browsers or devices? Does this raise a security concern? James talks about how to handle this question and analyze the root issue.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
I am sure you have heard about the AWS service disruption that occurred. Have you seen how we can learn from this when we look at our own tools and processes? James talks about how we need to look at our own applications and tools and consider how time has changed the landscape. There might be more than you think.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
I hear a lot of people struggling with HTTPOnly and Secure attributes on cookies. The names may be confusing to some. Change your viewpoint and it may become easier..
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
We always talk about Forgot Password... But what about Forgot Username? Listen in as James discusses why protecting this functionality is important and the ways it could be abused if not properly handled.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
In this episode, James talks about security questions, or secret questions. We see them used in many different places. People complain they are horrible. So are they that bad that you shouldn't use them? Is it possible to help reduce the risk with security questions?
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
A few months ago, it was announced that some companies buy stolen passwords off of the black market to help protect their users. This is done by determining if the user's password was part of that list and forcing a reset. James talks about the idea and raises some interesting questions. What do you think about the tactic?
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Are you, or have you, implemented a remember me feature for your application? What do you remember, username, password, or both? James talks about some security considerations around implementing a remember me feature for your application.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Do you use MongoDB? If so, is it exposed to the internet? Recent news (listed below) had shown that a large number of MongoDB instances are being infected with ransomware. James talks about the issue and ways to help ensure you are not the next victim.
Link to original article: http://arstechnica.com/security/2017/01/more-than-10000-online-databases-taken-hostage-by-ransomware-attackers/
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Implementing multi-factor authentication isn't just about a second factor. There are many considerations that need to be included. One in particular, how do you handle the user losing their means of that second factor. James talks about thinking this through.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Yahoo has announced yet another breach from back in 2013 affecting a very large number of user accounts. https://investor.yahoo.net/ReleaseDetail.cfm?&ReleaseID=1004285 This creates an opportunity to discuss password storage and the storage of security answers. Find out what we can takeaway from this incident.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
It is the holiday season. It is appropriate to talk about cookies. Not the kind that you bake, but the ones in your applications. James talks about the security mechanisms for cookies and clarifies what they are for.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Have you heard someone mention "untrusted" data? Applications take data from multiple data sources and we are often confused on what should be trusted or not. In this episode, James Jardine talks about untrusted data and some thoughts for moving past it.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Are you an organization looking to do source code review? Are you trying to hire a pen tester with source code review as a duty?
James talks about Secure Code Review and some common implementations.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Do you have a clear path for users to contact you about potential security issues in your application or device? Is there a potential for the communication to be lost in the mix? James talks about how it is important for users to have a clear path to communication when it comes to reporting security issues.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Having a penetration test performed against your applications? Do you have mobile and web applications performing the same functionality? James talks about the reason behind doing these assessments at the same time vs. separate. See why testing your entire offering can add benefit to your security assessment.
Link to DerbyCon Presentation
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Your pen tester want you to white list them in your WAF? What should you do? Why do they ask? James breaks it down for you in this episode.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
We talk HTTP/HTTPS all the time. Google just announced that in January they are going to change how they display their secure/not secure indicators for HTTP sites that have passwords or credit cards. James talks about how this can effect you.
Link to the article: https://security.googleblog.com/2016/09/moving-towards-more-secure-web.html
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Are your login forms secure? Are you sure? In this episode James talks about potential risks with presenting your login forms when using HTTPS and how to avoid them. We often are focused on HTTPS for the submission of credentials, but what about the loading of the form? What about frames?
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
The user interface plays a big part in the security of an application. We often only look at flaws such as XSS, but here James provides an example of the lack of Input Validation messages creating a Denial of Service type situation.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
James discusses how all applications, big or small, are a potential target and need to have secure coding practices. We often only look at our big applications from a security perspective, but in reality, all applications pose a risk.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
In this episode, James talks about what Username Enumeration is, how it can be used by attackers, and some ways to help reduce the risk of it.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Interesting question was raised around changing a password and the need to invalidate all the access tokens for the associated mobile devices. James talks about his view on the topic and how you can analyze your situation to determine the appropriate direction.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Pokemon Go has taken the world by storm and as always, it brings up some things to talk about regarding security. In this episode James talks about some out of the box security thoughts regarding mobile applications including app permissions, fake apps, and scams.
**Link to James' interview on News4Jax talking about Pokemon Go Security Concerns http://www.news4jax.com/news/morning-show/pokemon-go-security-concerns **
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
A question came in regarding auto-unlock of accounts and account lockout in general. James discusses his thoughts on this process and how he approaches these types of questions.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
A question came in around the need for the password confirm box on registration screens and the security implications. In this episode I respond to the question and give some insights on how to approach these types of questions from a security perspective.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
We are too quick to just give generic recommendations for resolving security vulnerabilities. We need to make sure that the application teams understand why these are vulnerabilities and why they are important. It all starts with Why is that functionality there. James talks about the importance of understanding the WHY and how it is a building block for better secure applications.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
When a developer was presented with a but they tried to say that it wasn't an issue because it was found by a tester using a Mac. "We don't support Macs" James talks about how this is a fundamental misunderstanding about security and tries to clear it up.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
James reflects on the current way we expect application teams to get security training and potential short falls. Is there a better way? Listen as I talk through some different points on the topic.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
How do you get your secure coding information? Do you pull code snippets from the internet? Who doesn't. How many of those actually use secure coding best practices. We have a challenge where most of our books, tutorials, and even college classes don't show secure code examples, just code examples. Everywhere we turn, the code we see is insecure. James Talks about this issue and some things you can do to help change that.
In the episode, James makes reference to the IT Hot Topics Conference (https://www.eiseverywhere.com/ehome/index.php?eventid=155122&). James will be presenting on Friday morning. If you are in the area, this may be a great conference to check out. See the link included for registration info.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Do you use an application inventory in your application security program? James discusses what an application inventory is and why it is important. Here is a list of a few tools that can be used to help identify some application details:
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 day advantage.
Penetration tests provide a measuring stick for security, but are you missing out on additional value? James discusses ways to use the pen test results to get more value out of a penetration test.
James will be providing a free webcast regarding Penetration Testing for Application Teams on March 18th, 2016. Here is the registration link: https://attendee.gototraining.com/r/3147075330537789954
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
James discusses what authentication is and some things to look out for.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
In this episode, James Jardine talks about some of the things you need to consider when trying to implement a static analysis program. It is more than just a tool you drop in. To build a successful program there are other considerations.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
James Jardine discusses CSRF chaining, using the combination of multiple CSRF requests to perform a task. Typically we believe that CSRF can only be done with one request, but with a little javascript it is possible to execute multiple requests. Listen in for more information.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
Presented by Jardine Software Inc. (https://www.jardinesoftware.com)
In this episode, James talks about what CSRF is, why it is a risk, and different ways to protect against it. CSRF is #8 on the OWASP Top 10 https://www.owasp.org/index.php/Top_10_2013-A8-Cross-Site_Request_Forgery_%28CSRF%29
Want to learn more about application security? Check out https://www.developsec.com. Follow us at @developsec on twitter.
James discusses Open Redirects, or on the OWASP Top 10 what is referred to as Unvalidated Redirects and Forwards (https://www.owasp.org/index.php/Top_10_2013-A10-Unvalidated_Redirects_and_Forwards) This is an introduction to what an Open Redirect is, why it is an issue, how to protect against it and how to test for it.
James discusses Hacking, what is it, why is it important. It is more than what you see in the media of the bad guys hacking computers. It is a curiosity, a hobby, an interesting in pushing limits. Some amazing things have come out of hacking. Check out this episode for more ramblings.
James discussing some things to consider this holiday season when searching for that perfect gift. It is important to understand the privacy policy (what is collected and how it is used) as well as the technologies the gift uses (Bluetooth, wifi, etc). This discussion addresses both consumers and the companies that create these gifts.
For more info go to https://www.developsec.com or follow us on twitter (@developsec).
James Jardine provides an overview of Dynamic Analysis and why it is important. Like any automation, there are pros and cons. Listen to find out why dynamic analysis is useful.
Some links to some dynamic analysis options that are available:
WhiteHat Security (http://www.whitehatsec.com)
HP - Web Inspect (http://www8.hp.com/us/en/software-solutions/webinspect-dynamic-analysis-dast/)
IBM App Scan (http://www-03.ibm.com/software/products/en/appscan)
Veracode (http://www.veracode.com)
Acunetix (https://www.acunetix.com/)
Join James Jardine as he discusses what Response Splitting/Header Injection is and how it works. He also discusses how ASP.Net helps defend against this attack.
This is a quick overview of the vulnerability and a great starting point for anyone learning security concepts.
Hi and welcome to the DevelopSec newscast for October 20th, 2015. I am James Jardine and I wanted to take a few moments to talk about some recent news stories over the past week.
- Apps installed a root certificate on device.
- Could allow monitoring of data, even SSL/TLS traffic.
- Recommended to uninstall the apps, unfortunately it was not made clear which ones they are.
- com CSRF bug pays security tester $25,000 - http://www.theregister.co.uk/2015/10/09/hotmail_hijack_hole_earns_boffin_25k_double_bug_bounty_trouble/
- Wesley Wineberg found a Cross-Site Request Forgery flaw in the Microsoft Outlook.com website.
- Could hijack user sessions.
- Responsible/Coordinated disclosure allowed flaw to be resolved before publicly disclosed.
- Medicaid Data Breach, Security Issue at NC and CA Facilities - http://healthitsecurity.com/news/medicaid-data-breach-security-issue-at-nc-and-ca-facilities
- Spreadsheet sent via email unencrypted.
- Highlights importance of attention to detail. Sometimes the simplest mistakes create a potential risk.
- Difficult to prove if data was accessed by unauthorized users.
- What options could be used instead of emailing the attachment?
- Thumb drive stolen from employees home
- Data should be encrypted.
- Ensure policies exist that cover acceptable use of portal storage.
- Ensure that employees are trained on the policies.
Join the conversation on google+ (https://www.google.com/+Developsec) and Twitter (@DevelopSec)
James breaks down a few news stories from the previous week. The following stories were discussed, including some brief points.
James breaks down a few news stories from the previous week. The following stories were discussed, including some brief points.
Follow us on Twitter (@developsec). If you want to be alerted when new items are available you can subscribe on our website at https://www.developsec.com
James talks about HTTP Strict Transport Security (HSTS) and what it is for. For more information, check out the corresponding post https://www.developsec.com/2015/09/17/http-strict-transport-security-hsts-overview/ that has links to other references.
Just recently, the FTC released "Start with Security: A Guide for Busines" which is a set of 10 items businesses can do to help secure their assetts. The full guide can be found at https://www.ftc.gov/tips-advice/business-center/guidance/start-security-guide-business.
James Jardine breaks gives an overview of the 10 items provided in the document. If you are a business, these are some good things to think about when it comes to security. The interesting twist is that it is not highly technical, rather uses real companies as examples for the different items.
In this episode, James Jardine talks about what penetration testing, "pen testing", is and how it really has a lot of meanings to different people. A pen test isn't something that should be considered negative, rather it is a positive approach to helping identify security risks to your organization.
In this episode James covers some thoughts on how business analysts and project managers are crucial to the security role for applications. It doesn't take a huge change in the way work is done and the domino affect carries all the way through to QA.
Accompanying Blog Post: https://www.developsec.com/2015/06/01/business-analysts-and-product-managers-security-roles/
Follow us on Twitter: @developsec
QA plays a crucial role in testing for security flaws within applications. They have the Proximity, Knowledge of the Application and it is an extension to the role they currently fill. James Jardine discusses why security testing is critical to the QA role.
Static analysis is an important part of the secure development lifecycle. There are some things to think about when you are considering a static analysis option. James discusses the questions in this episode.
Understanding baselines of our networks, applications, traffice, etc is important to identifying security issues. James Jardine shares some thoughts on the need for these baselines and why they are important. There is a quick write up on this topic at https://www.developsec.com.
CMS platforms are an easy way to get content to the internet, but we still have to consider security. James talks about some of the concerns and things to think about when thinking about these security features. For a more details, check out the blog post at https://www.developsec.com.
I came across an interesting tweet https://twitter.com/suffert/status/567486188383379456 depicting a good example of a black list that didn't quite cover everything I think they wanted too. This episode discusses the difference between black and white lists and some of the things to watch out for.
James talks about the need for developers, QA, business analysts and project managers to understand the type of application they are creating and the requirements around sensitive data.
Reference Links from the podcast:
http://www.njleg.state.nj.us/2014/Bills/S1000/562_R1.PDF
http://laws.flrules.org/2014/189
I discuss the lessons learned from the recent Moonpig security disclosure. This is full of information for a developer or QA tester. For more information, visit https://www.developsec.com
Are you looking to test our your security skills? There are lots of targets that are freely available to you that can be quite helpful. The good news is you won't be getting in trouble for hacking these applications. Here is a short list of some of the targets that exist for you to practice your web hacking skills.
Vulnerable Apps:
hackazon - http://www.ntobjectives.com/hackazon/
bWAPP - http://sourceforge.net/projects/bwapp/files/bee-box/
webgoat - https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project
DVWA - http://sourceforge.net/projects/dvwa/
Mutillidae - http://sourceforge.net/projects/mutillidae/
No matter what size company you are, sooner or later you will be subject to some form of security assessment. Whether that is a penetration test, architecture review, code review or some other assessment. It is important to be prepared. Have the documentation needed when the engagement starts. Most importantly, be honest to any questions and don't try and hide things. The point is to get an accurate view of the security landscape to better help the company's risk position. James talks about all this and more in this episode.
Are you sure you are performing proper authorization checks everyplace? What does Authorization even mean? James Jardine talks about Authorization and how QA, Dev and others can reinforce its implementation.
In this episode, James Jardine talks about the recent breaches regarding cloud services and whether or not we should be running for the hills. Lets focus on the real issue, not the hype of nude photos.
In this episode, James talks about security testing... scratch that, testing. There really is no difference between security testing and regular testing. The app is functioning in a way it was not designed to. QA can do this. Developers can do this. Listen to find out some of the ways that we can help move this forward to get our internal teams testing better.
The debate is out there, which is more important. I discuss what they are and how they both play a key role in securing an application.
This episode gives a high level overview of what XSS is and why it is of concern. Future episodes will dig deeper into the vulnerability.
We discuss a little about eBay and their unfortunate hack, how sourceforge has upgraded their password storage and a lot about cookies. What are cookies, how are they used, how do we secure them. Lots of great information about cookies.
In this episode, we talk about phishing. Mass email and spear phishing. What you should know about the topic and how to protect yourself.
This episode introduces the new Microsoft Threat Modeling Tool 2014. No more requirement for Visio.. woohoo. Lots of talk about threat modeling and its benefits.
Threat Modeling Tool 2014: http://download.microsoft.com/download/3/8/0/3800050D-2BE7-4222-8B22-AF91D073C4FA/MSThreatModelingTool2014.msi
Threat Modeling (book by Adam Shostack): http://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998/
In this episode we take a look at the two hottest topics.. Windows XP End of Life and Heartbleed. If you haven't heard of either of these, your under a rock (and you should listen). This is not an in-depth analysis of these, but just general thoughts on them.
In this episode, James Jardine talks about how oversharing with network shares is a big problem. Often times we open shares to too many people and we share sensitive information that shouldn't be shared. We need to look at how we monitor these shares and how, as a user, we share information on them.
Sorry.. seems to have recorded a little quiet this time.
We all see data breaches happen all the time, daily in most cases. James talks about how common this is, how companies can handle the situation and how users can be proactive to protect themselves.
In this episode, James Jardine discusses mobile security and why we need to be thinking about it. Devices are Powerful these days and we do everything on them. We can't afford to ignore the security aspect of these devices.
Here we are in 2014 and we still have SQL Injection issues. James Jardine discusses what SQL Injection is, how attackers take advantage of it and how developers can protect against it.
In this episode, James Jardine talks about web proxies and how they are used. Whether you are a developer, QA tester, or pen tester, web proxies are essential to your testing efforts. Some Proxies discussed:
- Burp Suite - http://portswigger.net/
- Fiddler - http://www.telerik.com/download/fiddler
- Zap Proxy - https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
Some cool extensions mentioned:
- Co2 - http://co2.professionallyevil.com/
- Watcher - http://websecuritytool.codeplex.com/
In this episode, James talks about these external systems that are connected to our networks. It is speculated that the Target breach was done through an HVAC system that was connected to the Internet. How many devices these days connect to the internet and have default passwords for the vendor to manage them. I discuss these ideas and things to think about when working with these systems.
In this episode, James covers some interesting topics about passwords. Why we use them, what makes one better than another, some password management options and multi-factor authentication.
This is the first episode of the DevelopSec podcast. The goal behind this podcast is to develop security awareness. Helping developers gain security knowledge, and also consumers with understanding security in general. We discuss recent breaches like Target and Neiman Marcus as well as the topics we will be discussing. We will talk about techniques, tools, and other resources that you can use.