The Hidden Dangers of Component Vulnerabilities
Dangerous flaws in open source components and dependencies lurk within most applications today.
April 21, 2017
It's been four years since OWASP first put third-party vulnerability risks squarely on the appsec map when it included the problem in its Top 10 list. But in that time, the risk has only grown as increasingly more applications today depend heavily on open-source libraries, frameworks, and other components, all with their own vulnerabilities.
It's a very large attack surface for applications today and one which has increased chances of security headaches. Here are some of the latest stats on this hidden problem.
About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024