Open letter to Veracode concerning duplicate flaws

UPDATE: This has been mostly resolved for me. I've seen a 80-90% reduction in duplicates. Thank you, Veracode Engineering.

I see duplicate flaws in every Veracode scan. CWE-73 External Control of File Name or Path is a particular severe offender. In a given scan, that same flaw appears… Read more »

Petya and WannaCry: Perimeter security is dead. Long live zero trust.

Both Petya and WannaCry are great demonstrations of how perimiter-based security is failing the industry and is better replaced with zero trust network security strategies like BeyondCorp. Read more »

Doing HTTP Sessions badly

In this article I explore some ways in which HTTP sessions can be used badly. I'm not talking from a church of RESTafarianism position here. I'm cool with web applications using HTTP sessions, but I want to explore the pitfalls of using them badly and given some easily followed guidance to… Read more »

Haskell Programming from First Principles: Final Review

Alas, all adventures must come to an end. In this final instalment of my incremental review of Julie and Chris' book I take some time to reflect on the entire book and give a holistic review. Read more »

Ambient Asset Management revisited

A while back I introduced the concept of ambient asset management. On further research I discovered some glaring gaps in that approach which I explore today. Read more »

More results...