Philippe De Ryck
921
page-template,page-template-full_width,page-template-full_width-php,page,page-id-921,bridge-core-3.0.2,qode-page-transition-enabled,ajax_fade,page_not_loaded,,vertical_menu_enabled, vertical_menu_hidden,vertical_menu_hidden_with_logo, vertical_menu_width_260,qode-title-hidden,side_menu_slide_with_content,width_470,qode-theme-ver-28.8,qode-theme-bridge,disabled_footer_top,qode_header_in_grid,wpb-js-composer js-comp-ver-6.9.0,vc_responsive

Philippe De Ryck

AppSec is too hard!?

Looking at available tools and features, it is easy to conclude that AppSec is shooting for the moon. Modern frameworks build security in by default, and vulnerable technologies are replaced by more secure alternatives. But regardless of all these good intentions, we see the same vulnerabilities popping up over and over again. Are we just careless when building applications, or is AppSec too hard? Throughout this talk, we review various cases where frameworks and libraries get in the way of security, paving the way for application-level vulnerabilities. With practical examples, we investigate more robust approaches to application security. The patterns we discuss will not only help you to improve the security of your applications but also make application security more manageable at scale.