Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring


Introduction
Prevent common software vulnerabilities

1. Using Components with Known Vulnerabilities: How Does It Work?
General concept

2. Impact of Using Components with Known Vulnerabilities
Example scenario 1
Example scenario 2

3. Preventing Using Components with Known Vulnerabilities
Continuously inventory and monitor
Apply virtual patches

4. Insufficient Logging and Monitoring: How Does It Work?
General concept

5. Impact of Insufficient Logging and Monitoring
Example scenario 1
Example scenario 2

6. Preventing Insufficient Logging and Monitoring
Ensure logs have sufficient user context
Ensure timely detection and response
Establish an incident response plan

Conclusion
Next steps