UPDATE: This has been mostly resolved for me. I've seen a 80-90% reduction in duplicates. Thank you, Veracode Engineering.
I see duplicate flaws in every Veracode scan. CWE-73 External Control of File Name or Path is a particular severe offender. In a given scan, that same flaw appears… Read more »
Both Petya and WannaCry are great demonstrations of how perimiter-based security is failing the industry and is better replaced with zero trust network security strategies like BeyondCorp. Read more »
In this article I explore some ways in which HTTP sessions can be used badly. I'm not talking from a church of RESTafarianism position here. I'm cool with web applications using HTTP sessions, but I want to explore the pitfalls of using them badly and given some easily followed guidance to… Read more »
Alas, all adventures must come to an end. In this final instalment of my incremental review of Julie and Chris' book I take some time to reflect on the entire book and give a holistic review. Read more »
A while back I introduced the concept of ambient asset management. On further research I discovered some glaring gaps in that approach which I explore today. Read more »