Artwork

Indhold leveret af CISO Tradecraft®. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af CISO Tradecraft® eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

#174 - OWASP Top 10 Web Application Attacks

44:23
 
Del
 

Manage episode 408745216 series 2849492
Indhold leveret af CISO Tradecraft®. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af CISO Tradecraft® eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

In this episode of CISO Tradecraft, host G. Mark Hardy delves into the crucial topic of the OWASP Top 10 Web Application Security Risks, offering insights on how attackers exploit vulnerabilities and practical advice on securing web applications. He introduces OWASP and its significant contributions to software security, then progresses to explain each of the OWASP Top 10 risks in detail, such as broken access control, injection flaws, and security misconfigurations. Through examples and recommendations, listeners are equipped with the knowledge to better protect their web applications and ultimately improve their cybersecurity posture.

OWASP Cheat Sheets: https://cheatsheetseries.owasp.org/

OWASP Top 10: https://owasp.org/www-project-top-ten/

Transcripts: https://docs.google.com/document/d/17Tzyd6i6qRqNfMJ8OOEOOGpGGW0S8w32

Chapters

  • 00:00 Introduction
  • 01:11 Introducing OWASP: A Pillar in Cybersecurity
  • 02:28 The Evolution of Web Vulnerabilities
  • 05:01 Exploring Web Application Security Risks
  • 07:46 Diving Deep into OWASP Top 10 Risks
  • 09:28 1) Broken Access Control
  • 14:09 2) Cryptographic Failures
  • 18:40 3) Injection Attacks
  • 23:57 4) Insecure Design
  • 25:15 5) Security Misconfiguration
  • 29:27 6) Vulnerable and Outdated Software Components
  • 32:31 7) Identification and Authentication Failures
  • 36:49 8) Software and Data Integrity Failures
  • 38:46 9) Security Logging and Monitoring Practices
  • 40:32 10) Server Side Request Forgery (SSRF)
  • 42:15 Recap and Conclusion: Mastering Web Application Security
  continue reading

216 episoder

Artwork
iconDel
 
Manage episode 408745216 series 2849492
Indhold leveret af CISO Tradecraft®. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af CISO Tradecraft® eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

In this episode of CISO Tradecraft, host G. Mark Hardy delves into the crucial topic of the OWASP Top 10 Web Application Security Risks, offering insights on how attackers exploit vulnerabilities and practical advice on securing web applications. He introduces OWASP and its significant contributions to software security, then progresses to explain each of the OWASP Top 10 risks in detail, such as broken access control, injection flaws, and security misconfigurations. Through examples and recommendations, listeners are equipped with the knowledge to better protect their web applications and ultimately improve their cybersecurity posture.

OWASP Cheat Sheets: https://cheatsheetseries.owasp.org/

OWASP Top 10: https://owasp.org/www-project-top-ten/

Transcripts: https://docs.google.com/document/d/17Tzyd6i6qRqNfMJ8OOEOOGpGGW0S8w32

Chapters

  • 00:00 Introduction
  • 01:11 Introducing OWASP: A Pillar in Cybersecurity
  • 02:28 The Evolution of Web Vulnerabilities
  • 05:01 Exploring Web Application Security Risks
  • 07:46 Diving Deep into OWASP Top 10 Risks
  • 09:28 1) Broken Access Control
  • 14:09 2) Cryptographic Failures
  • 18:40 3) Injection Attacks
  • 23:57 4) Insecure Design
  • 25:15 5) Security Misconfiguration
  • 29:27 6) Vulnerable and Outdated Software Components
  • 32:31 7) Identification and Authentication Failures
  • 36:49 8) Software and Data Integrity Failures
  • 38:46 9) Security Logging and Monitoring Practices
  • 40:32 10) Server Side Request Forgery (SSRF)
  • 42:15 Recap and Conclusion: Mastering Web Application Security
  continue reading

216 episoder

Alle afleveringen

×
 
Loading …

Velkommen til Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Hurtig referencevejledning

Lyt til dette show, mens du udforsker
Afspil