Bay threat2011
Upcoming SlideShare
Loading in...5
×
 

Bay threat2011

on

  • 1,975 views

 

Statistics

Views

Total Views
1,975
Views on SlideShare
701
Embed Views
1,274

Actions

Likes
1
Downloads
7
Comments
0

6 Embeds 1,274

http://blog.honeyapps.com 702
http://blog.risk.io 551
http://feeds.feedburner.com 14
http://www.linkedin.com 4
https://www.linkedin.com 2
http://feedproxy.google.com 1

Accessibility

Categories

Upload Details

Uploaded via as Apple Keynote

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • From Shaman to Scientist - A Use Case in Data Driven Security\n
  • \n
  • An increasingly rare species, dominant in the 90’s and around the turn of the century.\n
  • \n
  • Enter the age of the automated scanners! \n
  • We NEED more New School! There is data out there to be had but a Lack of communication & coordination create this perceived\n“lack of data”\n
  • the first step towards the New School of Information Security. Baby steps towards a quant approach. Using less secrecy & religion and more \nopenness and information sharing. In order to take the first steps, we have to get our own house in order.\n
  • Vulnerability management is an easy use case for taking these first steps. Let’s start walking through these steps.\n
  • Vulnerability management is an easy use case for taking these first steps. Let’s start walking through these steps.\n
  • \n
  • \n
  • \n
  • \n
  • Time to Fix by team, by class, by severity, by biz unit,etc,etc\nSDLC - Build Schedule - testing process - etc,etc\nTech Remediation Stats from Denim Report - factor in bug tracking reports & build/dev process\n
  • convert this into a visual funnel to produce same queries \n\nhd moores law should be shown as a node map highlighted.\n
  • Insert Alex Hutton formula\n4:14:40 PM Alex Hutton: once the data hits catwalk we decision and the threat is funneled off....\n4:15:46 PM Ed Bellis: haha its a new risk language\n4:16:05 PM Ed Bellis: you guys pull a lot of public sources of data?\n4:16:16 PM Alex Hutton: not yet\n4:16:21 PM Alex Hutton: some but not a ton\n4:16:24 PM Ed Bellis: also any insight on whether VERIS taking off?\n4:16:41 PM Alex Hutton: there's a broader vision (you can fit) that would make a lot of sense\n4:17:02 PM Alex Hutton: but that would take cooperation from various sources which is going to be hard, and why VERIS is a bit stalled\n4:17:17 PM Alex Hutton: there are lots of folks using VERIS, but not sharing data\n4:17:31 PM Ed Bellis:\n4:17:51 PM Ed Bellis: i'd love to tap into that\n4:19:34 PM Alex Hutton: well, the better vision is for you to feed data along with threat (and incident data) into decision making on a daily or even hourly basis\n4:19:50 PM Alex Hutton: In a sense, you hold not only the orgs perimeter, but a broad sample of perimeters\n4:20:04 PM Alex Hutton: and their\n4:20:12 PM Alex Hutton: vuln posture\n4:20:38 PM Alex Hutton: So\n4:21:07 PM Ed Bellis: right we want to move into a position where our data becomes the primary asset to help make better security decisions\n4:21:16 PM Ed Bellis: *not a verb*\n4:21:49 PM Alex Hutton: My(vuln posture * other threat activity) / (other vuln posture * other threat activity) = a much better metric than just vuln data\n4:22:24 PM Ed Bellis: meaning am i safer than my neighbor?\n4:22:25 PM Alex Hutton: in fact, a very interesting likelihood data point to do some degree of probabilistic analysis on that I don't have the time to really explore yet, but is very, very interesting\n4:23:10 PM Alex Hutton: that may be a byproduct, more about establishing a rate at which I can expect my luck to run out.\n4:23:23 PM Ed Bellis: i see\n4:23:35 PM Alex Hutton: so you're the CSO of Orbitz, you know you have a vuln. to specific threat activity.  So far, you're lucky\n4:24:02 PM Alex Hutton: but what about establishing rate of threat activity vs. how pervasive that same vuln is around other orgs?\n4:24:31 PM Ed Bellis: where do we get the rate of threat activity?\n4:24:42 PM Ed Bellis: breach db's?\n4:24:51 PM Alex Hutton: High Threat Activity + Low pervasiveness in the aggregate population = Luck running out.\n4:25:06 PM Alex Hutton: nope.  that's part of your exit strategy\n4:25:19 PM Ed Bellis: bought by verizon ?\n4:25:33 PM Alex Hutton: Some MSSP who is running or aggregating WAF data, Firewall/IDS/IPS data\n4:25:58 PM Alex Hutton: you as "Yet another managed service" well, that's a scenario I believe in, yes.\n4:26:20 PM Alex Hutton: But you as "Next generation in managed services by data aggregation" is going to be very, very compelling, I think\n4:26:46 PM Alex Hutton: what you have to understand (and I think you do) is how to leverage your data into "decision" (the verb)\n
  • \n
  • talk about infosec vs fraud\n
  • talk about infosec vs fraud\n
  • talk about infosec vs fraud\n
  • talk about infosec vs fraud\n
  • talk about infosec vs fraud\n
  • talk about infosec vs fraud\n
  • talk about infosec vs fraud\n
  • talk about infosec vs fraud\n
  • talk about infosec vs fraud\n
  • Insert Alex Hutton formula\n4:14:40 PM Alex Hutton: once the data hits catwalk we decision and the threat is funneled off....\n4:15:46 PM Ed Bellis: haha its a new risk language\n4:16:05 PM Ed Bellis: you guys pull a lot of public sources of data?\n4:16:16 PM Alex Hutton: not yet\n4:16:21 PM Alex Hutton: some but not a ton\n4:16:24 PM Ed Bellis: also any insight on whether VERIS taking off?\n4:16:41 PM Alex Hutton: there's a broader vision (you can fit) that would make a lot of sense\n4:17:02 PM Alex Hutton: but that would take cooperation from various sources which is going to be hard, and why VERIS is a bit stalled\n4:17:17 PM Alex Hutton: there are lots of folks using VERIS, but not sharing data\n4:17:31 PM Ed Bellis:\n4:17:51 PM Ed Bellis: i'd love to tap into that\n4:19:34 PM Alex Hutton: well, the better vision is for you to feed data along with threat (and incident data) into decision making on a daily or even hourly basis\n4:19:50 PM Alex Hutton: In a sense, you hold not only the orgs perimeter, but a broad sample of perimeters\n4:20:04 PM Alex Hutton: and their\n4:20:12 PM Alex Hutton: vuln posture\n4:20:38 PM Alex Hutton: So\n4:21:07 PM Ed Bellis: right we want to move into a position where our data becomes the primary asset to help make better security decisions\n4:21:16 PM Ed Bellis: *not a verb*\n4:21:49 PM Alex Hutton: My(vuln posture * other threat activity) / (other vuln posture * other threat activity) = a much better metric than just vuln data\n4:22:24 PM Ed Bellis: meaning am i safer than my neighbor?\n4:22:25 PM Alex Hutton: in fact, a very interesting likelihood data point to do some degree of probabilistic analysis on that I don't have the time to really explore yet, but is very, very interesting\n4:23:10 PM Alex Hutton: that may be a byproduct, more about establishing a rate at which I can expect my luck to run out.\n4:23:23 PM Ed Bellis: i see\n4:23:35 PM Alex Hutton: so you're the CSO of Orbitz, you know you have a vuln. to specific threat activity.  So far, you're lucky\n4:24:02 PM Alex Hutton: but what about establishing rate of threat activity vs. how pervasive that same vuln is around other orgs?\n4:24:31 PM Ed Bellis: where do we get the rate of threat activity?\n4:24:42 PM Ed Bellis: breach db's?\n4:24:51 PM Alex Hutton: High Threat Activity + Low pervasiveness in the aggregate population = Luck running out.\n4:25:06 PM Alex Hutton: nope.  that's part of your exit strategy\n4:25:19 PM Ed Bellis: bought by verizon ?\n4:25:33 PM Alex Hutton: Some MSSP who is running or aggregating WAF data, Firewall/IDS/IPS data\n4:25:58 PM Alex Hutton: you as "Yet another managed service" well, that's a scenario I believe in, yes.\n4:26:20 PM Alex Hutton: But you as "Next generation in managed services by data aggregation" is going to be very, very compelling, I think\n4:26:46 PM Alex Hutton: what you have to understand (and I think you do) is how to leverage your data into "decision" (the verb)\n
  • Insert Alex Hutton formula\n4:14:40 PM Alex Hutton: once the data hits catwalk we decision and the threat is funneled off....\n4:15:46 PM Ed Bellis: haha its a new risk language\n4:16:05 PM Ed Bellis: you guys pull a lot of public sources of data?\n4:16:16 PM Alex Hutton: not yet\n4:16:21 PM Alex Hutton: some but not a ton\n4:16:24 PM Ed Bellis: also any insight on whether VERIS taking off?\n4:16:41 PM Alex Hutton: there's a broader vision (you can fit) that would make a lot of sense\n4:17:02 PM Alex Hutton: but that would take cooperation from various sources which is going to be hard, and why VERIS is a bit stalled\n4:17:17 PM Alex Hutton: there are lots of folks using VERIS, but not sharing data\n4:17:31 PM Ed Bellis:\n4:17:51 PM Ed Bellis: i'd love to tap into that\n4:19:34 PM Alex Hutton: well, the better vision is for you to feed data along with threat (and incident data) into decision making on a daily or even hourly basis\n4:19:50 PM Alex Hutton: In a sense, you hold not only the orgs perimeter, but a broad sample of perimeters\n4:20:04 PM Alex Hutton: and their\n4:20:12 PM Alex Hutton: vuln posture\n4:20:38 PM Alex Hutton: So\n4:21:07 PM Ed Bellis: right we want to move into a position where our data becomes the primary asset to help make better security decisions\n4:21:16 PM Ed Bellis: *not a verb*\n4:21:49 PM Alex Hutton: My(vuln posture * other threat activity) / (other vuln posture * other threat activity) = a much better metric than just vuln data\n4:22:24 PM Ed Bellis: meaning am i safer than my neighbor?\n4:22:25 PM Alex Hutton: in fact, a very interesting likelihood data point to do some degree of probabilistic analysis on that I don't have the time to really explore yet, but is very, very interesting\n4:23:10 PM Alex Hutton: that may be a byproduct, more about establishing a rate at which I can expect my luck to run out.\n4:23:23 PM Ed Bellis: i see\n4:23:35 PM Alex Hutton: so you're the CSO of Orbitz, you know you have a vuln. to specific threat activity.  So far, you're lucky\n4:24:02 PM Alex Hutton: but what about establishing rate of threat activity vs. how pervasive that same vuln is around other orgs?\n4:24:31 PM Ed Bellis: where do we get the rate of threat activity?\n4:24:42 PM Ed Bellis: breach db's?\n4:24:51 PM Alex Hutton: High Threat Activity + Low pervasiveness in the aggregate population = Luck running out.\n4:25:06 PM Alex Hutton: nope.  that's part of your exit strategy\n4:25:19 PM Ed Bellis: bought by verizon ?\n4:25:33 PM Alex Hutton: Some MSSP who is running or aggregating WAF data, Firewall/IDS/IPS data\n4:25:58 PM Alex Hutton: you as "Yet another managed service" well, that's a scenario I believe in, yes.\n4:26:20 PM Alex Hutton: But you as "Next generation in managed services by data aggregation" is going to be very, very compelling, I think\n4:26:46 PM Alex Hutton: what you have to understand (and I think you do) is how to leverage your data into "decision" (the verb)\n
  • Insert Alex Hutton formula\n4:14:40 PM Alex Hutton: once the data hits catwalk we decision and the threat is funneled off....\n4:15:46 PM Ed Bellis: haha its a new risk language\n4:16:05 PM Ed Bellis: you guys pull a lot of public sources of data?\n4:16:16 PM Alex Hutton: not yet\n4:16:21 PM Alex Hutton: some but not a ton\n4:16:24 PM Ed Bellis: also any insight on whether VERIS taking off?\n4:16:41 PM Alex Hutton: there's a broader vision (you can fit) that would make a lot of sense\n4:17:02 PM Alex Hutton: but that would take cooperation from various sources which is going to be hard, and why VERIS is a bit stalled\n4:17:17 PM Alex Hutton: there are lots of folks using VERIS, but not sharing data\n4:17:31 PM Ed Bellis:\n4:17:51 PM Ed Bellis: i'd love to tap into that\n4:19:34 PM Alex Hutton: well, the better vision is for you to feed data along with threat (and incident data) into decision making on a daily or even hourly basis\n4:19:50 PM Alex Hutton: In a sense, you hold not only the orgs perimeter, but a broad sample of perimeters\n4:20:04 PM Alex Hutton: and their\n4:20:12 PM Alex Hutton: vuln posture\n4:20:38 PM Alex Hutton: So\n4:21:07 PM Ed Bellis: right we want to move into a position where our data becomes the primary asset to help make better security decisions\n4:21:16 PM Ed Bellis: *not a verb*\n4:21:49 PM Alex Hutton: My(vuln posture * other threat activity) / (other vuln posture * other threat activity) = a much better metric than just vuln data\n4:22:24 PM Ed Bellis: meaning am i safer than my neighbor?\n4:22:25 PM Alex Hutton: in fact, a very interesting likelihood data point to do some degree of probabilistic analysis on that I don't have the time to really explore yet, but is very, very interesting\n4:23:10 PM Alex Hutton: that may be a byproduct, more about establishing a rate at which I can expect my luck to run out.\n4:23:23 PM Ed Bellis: i see\n4:23:35 PM Alex Hutton: so you're the CSO of Orbitz, you know you have a vuln. to specific threat activity.  So far, you're lucky\n4:24:02 PM Alex Hutton: but what about establishing rate of threat activity vs. how pervasive that same vuln is around other orgs?\n4:24:31 PM Ed Bellis: where do we get the rate of threat activity?\n4:24:42 PM Ed Bellis: breach db's?\n4:24:51 PM Alex Hutton: High Threat Activity + Low pervasiveness in the aggregate population = Luck running out.\n4:25:06 PM Alex Hutton: nope.  that's part of your exit strategy\n4:25:19 PM Ed Bellis: bought by verizon ?\n4:25:33 PM Alex Hutton: Some MSSP who is running or aggregating WAF data, Firewall/IDS/IPS data\n4:25:58 PM Alex Hutton: you as "Yet another managed service" well, that's a scenario I believe in, yes.\n4:26:20 PM Alex Hutton: But you as "Next generation in managed services by data aggregation" is going to be very, very compelling, I think\n4:26:46 PM Alex Hutton: what you have to understand (and I think you do) is how to leverage your data into "decision" (the verb)\n
  • talk about infosec vs fraud\n
  • talk about infosec vs fraud\n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n

Bay threat2011 Bay threat2011 Presentation Transcript

  • From Shaman to Scientist:A Use Case in Data Driven Security
  • Nice To Meet YouAbout Me CoFounder HoneyApps Former CISO Orbitz Contributing Author Beautiful Security CSO Magazine/Online WriterHoneyApps Vulnerability Management as a Service 16 Hot Startups - eWeek 3 Startups to Watch - Information Week
  • Stage 1: Ignorance is Bliss
  • Stage 2: Where are all of my vulnerabilities? “Back in my Yahoo days I performed hundreds of web application vulnerability assessments. To streamline the workload, I created an assessment methodology consisting of a few thousand security tests averaging 40 hours to complete per website. Yahoo had over 600 websites enterprise-wide. To assess the security of every website would have taken over 11 years to complete and the other challenge was these websites would change all the time which decayed the value of my reports.” Jeremiah Grossman Founder, WhiteHat Security
  • Stage 3: Scan & Dump“thanks for the 1000 page report,now what?!”
  • Why This OccursLack of Communication Lack of DataLack of CoordinationSilos, Silos, Everywhere
  • Stage 4: A New BeginningOr......Using What You Got!
  • Vulnerability Management: A Case Study Building the WarehouseStructured Data LoadWebApp VulnerabilityType: XSSSeverityThreatSubtype: (persistent,reflected,etc)Asset URL/URIConfirmed?Dates Found/OpenedDates ClosedDescriptionAttack Parameters
  • Vulnerability Management: A Case Study Building the WarehouseStructured Data LoadWebApp Vulnerability Asset:URLType: XSS Platform / CodeSeverity Web Server VersionThreat Application Server VersionSubtype: (persistent,reflected,etc) Database VersionAsset URL/URIConfirmed?Dates Found/OpenedDates ClosedDescriptionAttack Parameters
  • Vulnerability Management: A Case Study Building the WarehouseStructured Data LoadWebApp Vulnerability Asset:URLType: XSS Platform / CodeSeverity Web Server VersionThreat Application Server VersionSubtype: (persistent,reflected,etc) Database VersionAsset URL/URIConfirmed? Asset:HostDates Found/Opened Host Operating SystemDates Closed Other Applications/VersionsDescription IP AddressesAttack Parameters Mac Address Open Services/Ports
  • Vulnerability Management: A Case Study Unstructured Data LoadWebApp Vulnerability Asset:URLType: XSS Platform / CodeSeverity Web Server VersionThreat Application Server Version Database VersionSubtype: (persistent,reflected,etc)Asset URL/URI Asset:HostConfirmed?Dates Found/Opened Host Operating SystemDates Closed Applications/Versions OtherDescription Addresses IPAttack Parameters Mac Address Open Services/Ports
  • Vulnerability Management: A Case Study Unstructured Data Load Meta DataWebApp Vulnerability Asset:URLType: XSS Platform / CodeSeverity Web Server Version Business Unit VERIS dataThreat Application Server Version Internal IP Address Database VersionSubtype: (persistent,reflected,etc) Geographic Location External IP AddressAsset URL/URI Asset:HostConfirmed? Development Team Network LocationDates Found/Opened Host Operating System Ops Team Site NameDates Closed Applications/Versions Other Compliance RegulationDescription Addresses IP Security Policy Asset GroupAttack Parameters Mac Address Open Services/Ports
  • Vulnerability Management: A Case Study Loosely Structured Data Load Meta DataWebApp Vulnerability Asset:URLType: XSS Platform / CodeSeverity Web Server VersionThreatUnit Application Server Version Business VERIS data Database VersionSubtype: (persistent,reflected,etc) Internal IP AddressAsset URL/URI Geographic LocationConfirmed? Asset:Host External IP Address DB HTTP Development Team Network LocationDates Found/Opened Host Operating SystemDates Closed Applications/Versions Ops Team Other Site NameDescription Addresses IP Compliance RegulationAttack Parameters Mac Address Security Policy Asset Group Open Services/Ports
  • Vulnerability Management: A Case Study Loosely Structured Data Load Meta DataWebApp Vulnerability Asset:URL Apply Internal Threat DataType: XSS Platform / CodeSeverity Web Server VersionThreatUnit Application Server Version Business VERIS data Firewall Application Database VersionSubtype: (persistent,reflected,etc) Internal IP AddressAsset URL/URI Geographic LocationConfirmed? Asset:Host External IP Address DB HTTP Development Team Network LocationDates Found/Opened Host Operating SystemDates Closed Applications/Versions Ops Team OtherDescription Addresses IP Compliance Regulation Site Name IDS/IPS WAFAttack Parameters Mac Address Security Policy Asset Group Open Services/Ports
  • Vulnerability Management: A Case Study Mixed Data Set Meta DataWebApp Vulnerability Asset:URLType: XSS Platform / CodeSeverity Web Server Version Apply Internal ThreatThreat Unit Application Server Version Business Internal IP Address VERIS data Database VersionSubtype: (persistent,reflected,etc)Asset URL/URI Geographic Location External IP Address Firew Asset:HostApplicatiConfirmed? Team Development Network LocationDates Found/Opened Host Operating SystemDates Team Other Applications/Versions Ops Closed Site Name IDS/ IPCompliance RegulationDescription Addresses WA Asset GroupAttack Parameters Security Mac Address Policy Open Services/Ports
  • Vulnerability Management: A Case Study Mixed Data Set Apply External Threat Data Meta DataWebApp Vulnerability Asset:URLType: XSS Platform / CodeSeverity Web Server Version Apply Internal ThreatThreat Unit Application Server Version Business Internal IP Address VERIS data Database VersionSubtype: (persistent,reflected,etc)Asset URL/URI Geographic Location External IP Address Firew Asset:HostApplicatiConfirmed? Team Development Network LocationDates Found/Opened Host Operating SystemDates Team Other Applications/Versions Ops Closed Site Name IDS/ IPCompliance RegulationDescription Addresses WA Asset GroupAttack Parameters Security Mac Address Policy Open Services/Ports
  • Vulnerability Management: A Case Study Mixed Data Set Apply External Threat Data Meta DataWebApp Vulnerability Asset:URL Example Data SourcesType: XSS Platform / CodeSeverity Web Server Version Apply Internal ThreatThreat Unit Application Server Version Business Internal IP Address VERIS data ❖DataLossDB Database VersionSubtype: (persistent,reflected,etc) ❖Verizon DBIRAsset URL/URI Geographic Location External IP Address Firew Asset:HostApplicatiConfirmed? Team ❖WHID DevelopmentDates Found/Opened Host Operating System Network Location ❖Trustwave Global Security ReportDates Team Other Applications/Versions Ops Closed Site Name ❖FS-ISAC IDS/ IPCompliance RegulationDescription Addresses ❖SANS ISC WA Asset GroupAttack Parameters Security Mac Address ❖Veracode State of S/W Security Policy Open Services/Ports ❖ExploitDB
  • Vulnerability Management: A Case Study Unstructured Data LoadWebApp Vulnerability Asset:URL Meta Data Type: XSS Platform / Code Severity Web Server Version Threat Application Server Version Apply Internal Threat Database Version Subtype: (persistent,reflected,etc) Business Unit Internal IP Address VERIS data Asset URL/URI Asset:Host Geographic Location External IP Address Confirmed? Firew Applicati Dates Found/Opened Network Location Host Operating System Development Team Dates Closed Applications/Versions Ops TeamOther Site Name Description Compliance Regulation IP AddressesIDS/ Attack Parameters Mac Address Asset Group WA Security Policy Open Services/Ports
  • Vulnerability Management: A Case Study Unstructured Data LoadWebApp Vulnerability Asset:URL Meta Data Type: XSS Platform / Code Severity Web Server Version Remediation Statistics Threat Application Server Version Apply Internal Threat Database Version Subtype: (persistent,reflected,etc) Business Unit Internal IP Address VERIS data Asset URL/URI Internal Bug Tracking Reports Asset:Host Geographic Location External IP Address Confirmed? Firew Applicati Dates Found/Opened Network Location Host Operating System Development Team Denim Group Remediation Study Dates Closed Applications/Versions Ops TeamOther Site Name Description Compliance Regulation IP AddressesIDS/ Attack Parameters Mac Address Asset Group Build and Development Process WA Security Policy Open Services/Ports
  • Data Lenses:Views into the Warehouse
  • Low Hanging Fruitvulns >10% of external breaches >10% of our malicious traffic in scope for $regulation sort
  • Secure Code Training Metric all vulns by application*vulns opened before 12/31/10** vulns opened after 2/28/11***sort by vulnerability class**secure code training rolled out 1/1/11 - 2/28/11
  • HD Moore’s Law
  • Vulns w/Ext Access
  • w/MetaSploit Modules
  • and connected systems
  • “Now sort by base,temporal &environmental”
  • Got MSSP?The Alex Hutton FormulaMy(vuln posture * other threat activity) / (other vuln posture * other threat activity)
  • Got MSSP?The Alex Hutton FormulaMy(vuln posture * other threat activity) / (other vuln posture * other threat activity) OR When Will Our Luck Run Out?
  • (we need more of this)
  • using what we have
  • The Twitter Poll
  • The Twitter Poll
  • The Twitter Poll
  • My Favorite Non-Sec ToolsTeaLeafGreenPlumZettasetRubySelenium
  • Resources ReferencedVerizon DBIR http://www.verizonbusiness.com/dbir/WASC Web App Security Stats http://projects.webappsec.org/w/page/VERIS Framework https://www2.icsalabs.com/veris/ 13246989/Web-Application-Security-StatisticsDenim Group - Real Cost of S/W FS-ISAC http://www.fsisac.com/Remediation WHID http://projects.webappsec.org/w/page/http://www.slideshare.net/denimgroup/real-cost-of- 13246995/Web-Hacking-Incident-Database/software-remediation SANS Internet Storm CenterDataLoss DB http://datalossdb.org/ http://isc.sans.org/TrustWave Global Security Report XForce http://xforce.iss.net/https://www.trustwave.com/GSR Veracode SOSS http://www.veracode.com/ images/pdf/soss/veracode-state-of-software-ExploitDB security-report-volume2.pdfhttp://www.exploit-db.com/
  • Q&Afollow us the blog http://blog.honeyapps.com/ twitter @ebellis And one more thing.... @risk_io We’re Hiring! https://www.risk.io/jobs