Explore a critical conference talk that delves into the widespread issue of poor software hygiene and its severe consequences. Learn about the alarming statistics surrounding vulnerable Struts downloads and their impact on thousands of organizations. Discover the timeline of critical Struts2 vulnerabilities, including those exploited in high-profile breaches like Equifax. Gain insights into effective strategies for rapid response and remediation to counter inevitable bugs and vulnerabilities, ultimately closing the gap between attackers and defenders in the cybersecurity landscape.
Overview
Syllabus
2017 - Attackers have the first mover advantage. Lets close that gap. - Brian Fox
Taught by
LASCON