02.02.2022 Views

Cyber Defense eMagazine February Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

We now live in a world where the internet has altered our daily lives <strong>for</strong> good. Working and interacting<br />

with one another no longer requires the physical presence of both parties within the same room. The<br />

number of people on the Internet is rapidly increasing, with around 3 billion individuals now having access.<br />

This has led to an exponential growth of web applications in recent years. Web applications, though<br />

convenient, also come with vulnerabilities. When it comes to web application security, organisations turn<br />

to penetration testing in order to identify potential vulnerabilities and weaknesses in their applications.<br />

We've gone ahead and compiled this article to shed some light on the top ten web application security<br />

risks according to OWASP and how you can use this as a guiding light while penetration testing. Let's<br />

get started.<br />

What is penetration testing?<br />

Penetration testing specifically in the web application domain is the process of testing <strong>for</strong> vulnerabilities<br />

by simulating attacks on it. Penetration testers use a variety of methods to attempt to exploit vulnerabilities<br />

in order to gain access to sensitive data or systems. The main goal of penetration testing is to identify<br />

and report on any security weaknesses that may exist in an organization's web applications and have<br />

them fixed as soon as possible.<br />

Why do you need to per<strong>for</strong>m penetration tests on web applications?<br />

Image Source: <strong>for</strong>egenix.com<br />

Web application pen testing is carried out <strong>for</strong> a number of reasons. The most important include:<br />

● To ensure that online applications are safer and have little to no vulnerabilities<br />

● To prevent unauthorized access<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2022</strong> <strong>Edition</strong> 47<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!