Jim Manico, founder of Manicode Security and Oliver Lavery, VP of Research at IMMUNIO
In this webinar, Jim Manico and Oliver Lavery address how application security is approached today, and how it can be improved, using the common vulnerability Cross Site Scripting (XSS) as an example. Today, application security is often left to developers with the idea that they will simply write perfect code that follows compliance regulations and has perfect functionality, and therefore there will be no security vulnerabilities or issues. Unfortunately, not only is this idea resource intensive and expensive, it is impossible. There will be errors in the code. XSS, for example, is a known vulnerability, but still afflicts 80% of web apps. Jim explains what a XSS attack is, how it is carried out, and potential effects.
Oliver Lavery will contend that there is a way for applications to secure themselves from vulnerabilities such as XSS by leveraging the commonality of applications: the frameworks they are built on. Building security measures into the framework at the application layer allows for internal access to the state of the app and requires no code changes or resources. Then demonstrate an HTML XSS attack to show that securing apps via their frameworks allows you to automate the process of learning proper code structure to determine if a change in that structure in future renderings is an attack that can be blocked.
You will learn:
What is Cross Site Scripting (XSS)
How are XSS attacks executed, and what are the ramifications
How can your app defend itself from and XSS attack
How building security measures into an apps framework can mitigate code vulnerabilities
How to secure your app without changing your code or deadline
Chris Romeo, CEO and co-founder of Security Journey and Goran Begic VP of Product of IMMUNIO
When it comes to managing cyber risk, what is the best approach? Fixing application vulnerabilities with strong security process before going into production? Or mitigating vulnerabilities through some other technology in production?
Security breaches are on the rise, many of which occur due to vulnerabilities in the application layer. New vulnerabilities are discovered daily and the frantic pace of software development shows no signs of slowing down. What chances do we have to turn the tables on Web Application security breaches?
Join the debate on Remediation vs. Mitigation to learn:
•How both approaches work to protect your web applications
•How you can improve your development process
•How to improve security of applications deployed in production
Runtime Application Self-Protection (RASP) is one of the newest technologies coined by Gartner and it is in early stages of adoption in the industry. It promises dynamic defense and automatic mitigation of vulnerabilities in web applications.
This webinar will provide an overview of buying criteria and evaluation requirements across different industries and some typical pitfalls that can slow down adoption.
After the introduction and a brief overview on the technology the audience will be invited to participate in discussion about organizational requirements for adoption and operationalization of RASP. Questions for discussion:
• My application is under attack. What actions should I take? Who owns the response?
• Which attacks should I respond to and which ones can I ignore?
• How to get started with mitigation provided by technology?
• Does RASP fit with DevOps?
• Does RASP help with remediation?
This is an objective discussion about RASP. Evaluation criteria, comparison of RASP with IAST and other security technologies, personal experiences and examples discussed in this talk are generally applicable to all RASP solutions.
Key takeaways: At the end of the presentation you will:
• Get a better understanding of requirements for evaluation of RASP and its use cases,
• If you can pull a successful evaluation alone, or if you will need participation of other groups / teams
• Learn about critical criteria for success of RASP in production
• How this criteria different relative to appsec testing tools.
You've done all the right things. Your developers are trained, they've taken all the secure coding courses, you use the best development frameworks, you scan your code before you release, you deploy behind a web app firewall - but your apps are still vulnerable.
Developers make mistakes, framework authors make mistakes. Security features get put on hold to work on product features. Web app firewalls slow things down, or get dropped into monitor-only mode, or hackers simply bypass them.
Runtime Application Self Protection (RASP) technology integrates directly with your application to provide strong, automatic protection without any additional effort from developers. Inside the application, the RASP can provide very strong protection that's impossible to bypass.
This webinar follows two typical attack scenarios facing today's web applications. For each scenario, we'll look at the attack vector in use and how applications are traditionally protected. We'll then compare the same attack with RASP protection to understand how RASP works and how it can enhance your development and operational processes, making many attacks impossible.
Ilan Rabinovitch, Director, Technical Community and Evangelism at Datadog and Mike Milner, CTO and cofounder of IMMUNIO
With Datadog’s cloud-scale performance monitoring capabilities, users obtain invaluable operational data about their cloud environment and applications. IMMUNIO is the latest addition to the list of more than 100 turnkey Datadog integrations (a group that also includes Amazon Web Services, Docker, and Slack). The IMMUNIO integration makes your existing Datadog monitoring even more powerful. By using IMMUNIO with Datadog, you gain critical insights into how attacks are affecting your system -- and you get the tools you need to stop the attacks immediately.
The data provided by your IMMUNIO integration with Datadog helps you determine what’s normal for your system and your apps -- so you can quickly zero in on abnormal activity, determine whether it’s malicious, and immediately safeguard your apps.
Join IMMUNIO and Datadog for this informative webinar and get the scoop on all the benefits of the IMMUNIO integration, including the ability to:
- Correlate CPU usage spikes with a brute force login attack
- Diagnose database query latency by matching to a blind SQL Injection attack
- Use IMMUNIO to stop bots by automatically serving CAPTCHAs, and set a Datadog alert based on number of CAPTCHAs served.
- Harden your application against Cross-Site Scripting, SQL Injection, Remote Command Execution, and other vulnerabilities -- even many zero-day attacks
Over the last few years, there are a known 620 million user accounts that have been compromised across hundreds of sites. Organized cybercrime have figured out that this is the fastest, most reliable method to infiltrate organizations, as well as achieve financial gain. Since users share passwords across multiple sites, it is easier to find logins that work on a target site than try to bypass firewalls, find software flaws, or even run spearphishing campaigns.
These types of attacks are collectively coming to be known as “Account Takeover” (ATO). Some are simple, while others are sophisticated. Some can be stopped relatively easily, and others require much more effort.
ATO attacks (via stolen credentials) were cited as the #1 method of confirmed data breaches in both 2014 and 2015, for web applications, which itself was the #1 vector for data breaches.
Come learn what these ATO threats are, their impact to your business, how to detect them, and what you can do about it.
Mike Milner, CTO & Co-Founder, IMMUNIO & Josh Downs, Community Manager, BrightTALK
- RSA 2016 -
BrightTALK spoke with IMMUNIO's Mike Milner on the cyber skills shortage, how to defend rapidly-digitalizing financial institutions and what the world can be optimistic about for the next few years in cyberspace.
IMMUNIO provides automatic detection and protection against application security vulnerabilities through real-time application self-protection (RASP). IMMUNIO augments applications with the necessary protection services and hardens applications against common attacks targeting typical security weaknesses. This channel highlights a transformative approach to make truly effective real-time web protection technology easily available and widely deployed, and by doing so, stop the biggest source of breached data records.