Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by CCC media team. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CCC media team or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Automated vulnerability scanning and vulnerability management (mrmcd25)

46:04
 
Share
 

Manage episode 506261731 series 2475293
Content provided by CCC media team. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CCC media team or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Within software development you will experience vulnerabilities, misconfigurations and sadly lazy developers and operations people taking shortcuts. I will talk over the experience of implementing automated vulnerability scaning and the abilities there and have the results handled in the vulnerability managment tool DefectDojo. Automated vulnerability scanning is a useful practice to find a lot of especially low hanging fruits within developed software. Especially vulnerable libaries and misconfigurations can be found relatively easy. Repositories, Docker containers and virtual machines can be scanned for problems before an attacker does. Vulnerability management tooling will help you rate, coordinate and close vulnerabilities through visibility for the developers and managers. I will go over the possibilities and share some experience of implementing it. https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://talks.mrmcd.net/2025/talk/JTJP8E/
  continue reading

2030 episodes

Artwork
iconShare
 
Manage episode 506261731 series 2475293
Content provided by CCC media team. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CCC media team or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Within software development you will experience vulnerabilities, misconfigurations and sadly lazy developers and operations people taking shortcuts. I will talk over the experience of implementing automated vulnerability scaning and the abilities there and have the results handled in the vulnerability managment tool DefectDojo. Automated vulnerability scanning is a useful practice to find a lot of especially low hanging fruits within developed software. Especially vulnerable libaries and misconfigurations can be found relatively easy. Repositories, Docker containers and virtual machines can be scanned for problems before an attacker does. Vulnerability management tooling will help you rate, coordinate and close vulnerabilities through visibility for the developers and managers. I will go over the possibilities and share some experience of implementing it. https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://talks.mrmcd.net/2025/talk/JTJP8E/
  continue reading

2030 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play