Application Security Weekly (Audio)

Ten Things I Hate About Lists - ASW #242


Listen Later

The OWASP Top 10 dates back to 2003, when appsec was just settling on terms like cross-site scripting and SQL injection. It's a list that everyone knows about and everyone talks about. But is it still the right model for modern appsec awareness? What if we put that attention and effort elsewhere? Maybe we could have secure defaults instead. Or linters and build tools that point out these flaws. We'll talk about top 10 lists, what we like about them, what we don't like, and what we'd like to see replace them. We'll also test our hosts' knowledge of just how many top 10 lists are out there.

 

Segment resources:

  • [OWASP Top 10:2021](https://owasp.org/Top10/
  • [OWASP API Security Project](https://owasp.org/www-project-api-security/)
  • [OWASP Top 10 Mobile Risks](https://github.com/OWASP/www-project-mobile-top-10/blob/master/2016-risks/index.md)
  • [OWASP Top 10 CI/CD Security Risks](https://owasp.org/www-project-top-10-ci-cd-security-risks/) and [ASW #220](https://www.scmagazine.com/podcast-episode/asw-220-daniel-krivelevich)
  • [OWASP Low-Code/No-Code Top 10](https://owasp.org/www-project-top-10-low-code-no-code-security-risks/)
  • [OWASP Top 10 Privacy Risks](https://owasp.org/www-project-top-10-privacy-risks/)
  • [OWASP Proactive Controls](https://owasp.org/www-project-proactive-controls/)
  • [OWASP AI Security and Privacy Guide](https://owasp.org/www-project-ai-security-and-privacy-guide/)
  • [OWASP Cheat Sheet Series](https://cheatsheetseries.owasp.org)
  • [OWASP Application Security Verification Standard](https://owasp.org/www-project-application-security-verification-standard/) and [ASW #232](https://www.scmagazine.com/podcast-episode/asw-232-josh-grossman)
  • [Moving on from the OWASP Top 10](https://deadliestwebattacks.com/appsec/2023/03/30/reflecting-on-the-owasp-top-10)

 

New TLDs are already old news, fuzzing eBPF validators, Microsoft sets to kill bug classes, draft RFC to track location trackers, a top ten list with directory traversal on it, conference videos from Real World Crypto and BSidesSF, and an attack tree generator from markdown.

 

Visit https://www.securityweekly.com/asw for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/secweekly

Like us on Facebook: https://www.facebook.com/secweekly

 

Show Notes: https://securityweekly.com/asw242 

...more
View all episodesView all episodes
Download on the App Store

Application Security Weekly (Audio)By Security Weekly Productions

  • 4.9
  • 4.9
  • 4.9
  • 4.9
  • 4.9

4.9

11 ratings


More shows like Application Security Weekly (Audio)

View all
Marketplace Tech by Marketplace

Marketplace Tech

1,275 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

1,966 Listeners

Risky Business by Patrick Gray

Risky Business

360 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

628 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,012 Listeners

Enterprise Security Weekly (Audio) by Security Weekly Productions

Enterprise Security Weekly (Audio)

14 Listeners

AWS Podcast by Amazon Web Services

AWS Podcast

201 Listeners

Business Security Weekly (Audio) by Security Weekly Productions

Business Security Weekly (Audio)

3 Listeners

Paul's Security Weekly (Audio) by Security Weekly Productions

Paul's Security Weekly (Audio)

14 Listeners

The Application Security Podcast by Chris Romeo and Robert Hurlbut

The Application Security Podcast

36 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,842 Listeners

Hacking Humans by N2K Networks

Hacking Humans

311 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

78 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

119 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

33 Listeners