Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

End of Bibblio RCM includes -->

Voice of Security Radio: Building Secure Applications

In too many companies, security vulnerabilities start at the application. Join us for this week's episode to hear how to make your applications more secure.

We move data around systems and networks, but in the final analysis everything comes down to the applications. And in 2017 the news is still filled with stories of companies that left a door open to their data and systems -- an accidental door right in the middle of their enterprise applications. That's why this week's episode of Voice of Security is all about application security and how to make sure your applications aren’t the biggest vulnerability in your enterprise.

Register here and mark your calendar for 3:00 p.m. EDT on Thursday, August 24 when editor Curt Franklin will welcome Matt Rose, director of application security strategy for Checkmarx, as we look at the reasons why true application security has proven so elusive. We'll also be talking about things an organization can do to improve its application security without a "from the ground up" redesign of the development process.


Want to learn more about how LTE-A Pro and Gigabit LTE will impact the 5G market? Join us in San Francisco for LTE Advanced Pro and Gigabit LTE: The Path to 5G event -- a free breakfast collocated at Mobile World Congress Americas with a keynote address by Sprint's COO Günther Ottendorfer.

 

Matt Rose has more than 18 years of software development, sales engineering management and consulting experience. During this time, he has helped some of the largest organizations in the world in a variety of industries, regions and technical environments implement secure software development life cycles utilizing static analysis. Rose's extensive background in application security, object-oriented programming, multi-tier architecture design/implementation and Internet/intranet development has been key to many speaking engagements for organizations like OWASP, ISSA and ISACA

 

We'll talk with Matt about keeping vulnerabilities out of enterprise applications on this week's Voice of Security Radio. Register here and join us at 3:00 p.m. EDT on Thursday, August 24 for a lively episode. And remember: You'll have a chance to ask your own questions when you join the conversation around the episode. When the on-air portion ends, Matt will join the discussion to answer your questions directly -- and that's something you won't want to miss.

— Curtis Franklin is the editor of SecurityNow.com. Follow him on Twitter @kg4gwa.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31099
PUBLISHED: 2022-06-27
rulex is a new, portable, regular expression language. When parsing untrusted rulex expressions, the stack may overflow, possibly enabling a Denial of Service attack. This happens when parsing an expression with several hundred levels of nesting, causing the process to abort immediately. This is a s...
CVE-2022-31101
PUBLISHED: 2022-06-27
prestashop/blockwishlist is a prestashop extension which adds a block containing the customer's wishlists. In affected versions an authenticated customer can perform SQL injection. This issue is fixed in version 2.1.1. Users are advised to upgrade. There are no known workarounds for this issue.
CVE-2022-31103
PUBLISHED: 2022-06-27
lettersanitizer is a DOM-based HTML email sanitizer for in-browser email rendering. All versions of lettersanitizer below 1.0.2 are affected by a denial of service issue when processing a CSS at-rule `@keyframes`. This package is depended on by [react-letter](https://github.com/mat-sz/react-letter),...
CVE-2022-32994
PUBLISHED: 2022-06-27
Halo CMS v1.5.3 was discovered to contain an arbitrary file upload vulnerability via the component /api/admin/attachments/upload.
CVE-2022-32995
PUBLISHED: 2022-06-27
Halo CMS v1.5.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the template remote download function.