Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K. What's the common denominator in security incidents? Escalations and lateral movement? When a privileged account is compromised, attackers can seize control of critical assets with bad directory hygiene and years of technical debt. Identity attack paths are easy targets for threat actors to exploit, but hard for defenders to detect. This poses risk in active directory, entra ID and hybrid configurations. Identity leaders are reducing such risks with attack path management. You can learn how attack path management is connecting identity and security teams while reducing risk with Bloodhound Enterprise powered by Spectrops. Head to Spectrops IO today to learn more. Spectrops See your attack paths the way adversaries do.
B (1:13)
The word is OWASP cryptographic failures spelled O for open W for Web A for application S for security P for project Cryptographic as in the art and science of code making and failures for the inability to achieve a goal Definition code that fails to protect sensitive information Example sentence Alan Turing and the team at Bletchley park took advantage of a cryptographic failure during World War II when they broke the encryption scheme used by the German Enigma machine. Origin and Context Dave Wickers and Jeff Williams, working for Aspect Security, a software consultancy company, published an education piece in 2003 on the top software security coding issues of the day that eventually turned into the OWASP top 10, a reference document describing the most critical security concerns for Web applications. Today, OWASP is an international volunteer team of security professionals led by the foundation executive director and top 10 project leader, Andrew Vanderstock. OWASP is dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. Today there are tens of thousands of members and hundreds of chapters worldwide. In 2021, OWASP published an updated list where they upgraded the old sensitive data exposure label to cryptographic failures and moved it up the priority list to number two. Cryptographic failures result when software managing sensitive data in transit or at rest, such as passwords, credit card numbers, health records, and personal information, leaves that data unprotected. For example, a website that doesn't enforce the Transport Layer security protocol or TLS for all pages is a cryptographic failure. A Web application that uses unsalted password generators is also a cryptographic failure. There are many more examples. The OWASP website describes these in detail and offers best practices for developers looking to improve their code. Nerd reference in January 2020 in 2021, Andrew Vanderstock explained the beginning of the Top 10 project why the Top 10 lists have been consistently the same for almost 20 years and the next steps the project will take to improve the list in the future Back in the.
![OWASP cryptographic failures (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F8e9cfa1c-10ac-11f0-bc8c-2f09ea78a0d6%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)