Risk vs Vulnerability

cwysopal's picture
By Chris Wysopal December 18, 2007

George Ou has an interesting analysis of Microsoft OS vs Apple OS vulnerability counts. Anything comparing the security of these two companies becomes controversial. I think that any analysis of vulnerability counts should include a paragraph on risk vs. vulnerabilities to diffuse the Mac fanboys. I might be able to leave my backdoor safely unlocked (a vulnerability) in the suburbs of Boston in... READ MORE

Thought Exercise: Automated Vulnerability Creation

CEng's picture
By Chris Eng November 15, 2007 3

A few of us were hanging out in the Veracode kitchen the other day and got to discussing the idea of programmatically injecting vulnerabilities into software. This is essentially the opposite of the problem that most security vendors, including ourselves, are trying to solve -- that is, detecting vulnerabilities. Clearly there's not much business value in making software less safe, though you... READ MORE

Veracode Makes 10 IT Security Companies to Watch

cwysopal's picture
By Chris Wysopal October 16, 2007

Network World has named Veracode to their 10 IT Security Companies to Watch. Sim Simeonov has some commentary on this is his blog. READ MORE

External Code in the Software Development Process

cwysopal's picture
By Chris Wysopal October 16, 2007

Recently I got a message from Kelley Jackson Higgins of Dark Reading. She was looking for some comments on Fortify Software's new paper on "Cross Build Injection" or "XBI". I had read the paper and, while I think the issues are real, the way they are framed they miss the big picture. So I figured I would partake in a little "XPI", that's "Cross Publicity Injection", and take this opportunity to... READ MORE

Exploits of a Mom

cwysopal's picture
By Chris Wysopal October 10, 2007

XKCD has a funny web security theme today: READ MORE

Classifying and Prioritizing Software Vulnerabilities

KMunro's picture
By October 8, 2007

We were more than pleased to read a new report by John Pescatore of Gartner recommending that security managers adopt the use of the Common Vulnerability Scoring System (CVSS) to support more repeatable, fast-acting vulnerability management processes. This recommendation backs up the decision made by our CTO, Chris Wysopal, more than a year ago to adopt the CVSS standard as a part of the Veracode... READ MORE

Friday Hacker Brainstorming

cwysopal's picture
By Chris Wysopal October 5, 2007

Sometimes when you are deep in the forest looking at one branch of one tree, trying to reduce false negative rates for detecting a specific class of software vulnerability, it is useful to step back and look at the forest of what is going on in criminal hacking. Today we were throwing some ideas around the office about hacking techniques we had seen reported. This got the discussion flowing... READ MORE

Secure Software and Application Testing - Before Procurement

KMunro's picture
By September 25, 2007

Chenxi Wang of Forrester Research and Chris Wysopal, our founder and CTO, will discuss ways to secure applications before they are purchased and deployed in an enterprise -- as a part of contract negotiations and the RFI and RFP process. More information on the seminar and instructions on how to register can be found on the Veracode site. READ MORE

PCI Extends Its Reach to Application Security

CEng's picture
By Chris Eng September 20, 2007

Earlier this week, I attended the first PCI Community Meeting in Toronto, a gathering organized by the PCI Security Standards Council to bring QSAs, ASVs, and other PCI stakeholders together in one room with the PCI Council. Let's be honest here -- in the security industry, discussing regulatory compliance is about as dull as it gets. On the other hand, compliance is also a major catalyst,... READ MORE

The Weakest Link

KMunro's picture
By September 17, 2007

We spend a lot of time thinking about hackers and abuse cases. This article entitled "Who Needs Hackers" by John Schwartz of the New York Times talks about how flawed systems, the increasing complexity of systems, and even mergers and acquisitions can make computer systems unreliable. The rush to market can lead to not enough testing. Pressures to ship software and hardware quickly and to keep... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.




contact menu