Webinar Series: Purple Teaming - Validating Detection & Response Capabilities
If you weren't paying attention during the early Summer months this year, you may have missed the overwhelming rate at which web sites were being publicly compromised and mocked. Often, these sites were prone to compromise due to SQL injection and other common web site vulnerability avenues. Even Barracuda Networks was compromised when apparently they took down their own security product for maintenance and were taken advantage of.The reality is that even large corporations, banks, and public organizations aren't having their web sites developed nearly as well as you'd expect. Often, much attention is given to a company's internal infrastructure, their end-user PCs, and the network holding together operations.The web presence of a company may just be an afterthought, something left for the creative and marketing people to get their brand out. However, in too many cases, web sites provide people a place to store personal information, re-used passwords, and don't adequately protect that information from would-be attackers.Considering the frequency of occurrence, the reality of insecurely programmed web applications, and a lack of due-diligence on the part of developers, other steps should be taken to ensure a few lines of code doesn't land you on the front page of a newspaper or web site.
Ultimately, a few lines of poorly programmed code should not be the end of the defense system for any web application (or any application, for that matter). By utilizing some or all of the above, greater insight into the efficacy of code can be determined before an attack occurs. There's no reason why one programmer should allow your entire company's user database to be stolen.
Security news, tips, webinars, and more straight to your inbox.