OWASP Newsletter 15
OWASP Newsletter #15 (28-March-2008)
Welcome to the 15th edition of the OWASP Newsletter, featuring the OWASP NYC AppSec 2008 Conference, OWASP Week 2008, and the OWASP Guide 3.0 Development Resumes.
As always, if you have any content to add to the next edition, please feel free to add it directly to its WIKI page OWASP Newsletter 16.
Alison McNamee - OWASP Operations Director - Tel: 301-575-0197 - eMail: Alison.firstname.lastname@example.org
Featured Item: OWASP Europe AppSec 2008 Conference
The OWASP Europe AppSec 2008 Conference will take place on May 19th-22nd. After successful OWASP Conferences in the United States and Europe, we are back in Belgium: 5 tutorials and 2 conference tracks in the historic center of Ghent! The conference is stuffed with top notch presentations from industry recognised speakers and technical experts on the latest application security risks and trends.
Amongst the 30+ speakers are Mark Curphey, Dinis Cruz, Ivan Ristic, Petko (pdp) Petkov, Brian Chess and Gary McGraw!
Registration for training and attendees will open up on April 1st, 2008. For full details on the event click here.
Featured Item: OWASP NYC AppSec 2008 Conference
The OWASP NYC AppSec 2008 Conference will take place on October 7th-10th. At this event, there will be two days of Multi-track Seminars, Capture the Flag, two days of Hands-On Training and a Vendor Exhibit. The conference will be held downtown New York City with the capacity for up to 1,000 attendees register early!
Registration for training and attendees will open up on April 1st, 2008. For full details on the event, to submit a talk or for more information on sponsorship opportunities click here.
Featured Item: OWASP Week 2008
Following the success of OWASP Day in 2007, this year we have decided to have the first ever OWASP Week! This will take place between March 30th and April 4th. To see what chapters are participating, please go to OWASP_Week_April_08.
Featured Project: OWASP Guide 3.0 Development Resumes
Andrew van der Stock, the OWASP Guide Project Lead, is calling for volunteers to re-factor the OWASP Guide to be solely about secure architecture and coding using ESAPI. This will help distinguish the Guide from our other major documents:
- The Guide will become solely about coding securely using ESAPI with J2EE, .NET and PHP
- The Code Review Guide is about reviewing web apps
- The Testing Guide is about testing web apps
Andrew is looking for volunteers to take on individual chapters. There are 16 chapters, and each should take one person about a month to re-factor, followed by a few months for peer review, QA, diagrams, and final acceptance. The goal is to release the final OWASP Guide 3.0 at the OWASP US Conference in late 2008.
If you're interested, please join the owasp-guide mail list:
Once joined, please post to the list with an introduction and a list of which chapters you'd are interested in taking on. If you've previously volunteered, please just say so and priority will be given to your chapter choices.
Featured Item: OWASP Summer of Code 2008 - 35 uploaded applications
Latest additions to the WIKI
New Chapter Pages
- OWASP Flash Security Project
- OWASP DirBuster Project
- OWASP Backend Security Project
- OWASP JBroFuzz
- JSP JSTL
- Preventing LDAP Injection in Java
- Password length & complexity
- OWASP Project Assessment
- OWASP Enterprise Security API
- OWASP Video
Updated chapter pages:
- Mexico City
- Virginia (Northern Virginia)
- Minneapolis St Paul
- Washington DC
New Documents & Presentations from chapters
For a complete list of chapter presentations see the online table of presentations.
OWASP references in the Media
- The First Rule of Programming: It's Always Your Fault
- OWASP ESAPI
- OWASP Enterprise Security API
- OWASP-Ideas for unit testing web security
- Top 10 Reasons Web Sites get Hacked
- Do Outsourcing Firms write secure code?
- OWASP Talk PHP Code Analysis Real World Examples
- OWASP Summer of Code
- AntiSamy 1.1 is out!
- Economics of Industry Certifications
- Conference 2008 at NY
- Web Testing and Reporting Best Practices
- XSS and CSRF Attacks
- Email Encryption
- OWASP Australia 2008
- Software Vendors and OWASP
- February OWASP Top 10 - Exploits
- Exposing ECM Security Vulnerabilities