Perfect Vulnerability Reports and Still Getting Hacked - Limitations of Security Tools
Offered By: BSidesLV via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the complexities of vulnerability management in this 47-minute conference talk from BSidesLV. Delve into the limitations of common security tools like software composition analysis (SCA) and software bills of material (SBOMs) in identifying all potential vulnerabilities. Examine the vulnerability reporting ecosystem, including databases and manual triage processes. Discover why even applications with seemingly perfect vulnerability reports can still be susceptible to attacks. Learn about empirical research highlighting challenges in vulnerability management, the ongoing battle against security by obscurity, and the daily efforts required to keep applications free of known vulnerabilities. Gain insights into future developments aimed at improving vulnerability detection and management, including open-source tools and enhanced government policies. Presented by Zachary Newman and Luca Guerra, this talk offers valuable knowledge for security professionals and developers seeking to strengthen their application security practices.
Syllabus
CG - How to have perfect vulnerability reports and still get hacked
Taught by
BSidesLV
Related Courses
AZ-303 Part 2 - Implement Management and Security Solutions in AzureA Cloud Guru AZ-500 Microsoft Azure Security Technologies
A Cloud Guru CompTIA CySA+ Certification
A Cloud Guru CompTIA PenTest+ Certification
A Cloud Guru Google Certified Professional Cloud Developer
A Cloud Guru