YoVDO

Perfect Vulnerability Reports and Still Getting Hacked - Limitations of Security Tools

Offered By: BSidesLV via YouTube

Tags

Vulnerability Management Courses Cybersecurity Courses Application Security Courses Security Research Courses Software Composition Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the complexities of vulnerability management in this 47-minute conference talk from BSidesLV. Delve into the limitations of common security tools like software composition analysis (SCA) and software bills of material (SBOMs) in identifying all potential vulnerabilities. Examine the vulnerability reporting ecosystem, including databases and manual triage processes. Discover why even applications with seemingly perfect vulnerability reports can still be susceptible to attacks. Learn about empirical research highlighting challenges in vulnerability management, the ongoing battle against security by obscurity, and the daily efforts required to keep applications free of known vulnerabilities. Gain insights into future developments aimed at improving vulnerability detection and management, including open-source tools and enhanced government policies. Presented by Zachary Newman and Luca Guerra, this talk offers valuable knowledge for security professionals and developers seeking to strengthen their application security practices.

Syllabus

CG - How to have perfect vulnerability reports and still get hacked


Taught by

BSidesLV

Related Courses

AZ-303 Part 2 - Implement Management and Security Solutions in Azure
A Cloud Guru
AZ-500 Microsoft Azure Security Technologies
A Cloud Guru
CompTIA CySA+ Certification
A Cloud Guru
CompTIA PenTest+ Certification
A Cloud Guru
Google Certified Professional Cloud Developer
A Cloud Guru