| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Digging deeper into a topic that we first presented at Black
Hat USA 2014- this presentation will expand on the challenges
we face in securing third party libraries in the products and
enterprise networks we are responsible for. More Libraries!
More Vulnerabilities! More Things! Many developers today
are turning to well established third-party libraries to speed
the development process and realize quality improvements
over creating an in-house proprietary font parsing or image
rendering library from the ground up. Efficiency comes at
a cost though: a single application may have as many as
100 different third party libraries implemented. The result
is that third-party and open source libraries have the ability
to spread a single vulnerability across multiple products-
exposing enterprises and requiring software vendors and
IT organizations to patch the same vulnerability repeatedly.
How big of a problem is this? What libraries are the biggest
offenders for spreading pestilence? And what can be done
to minimize this problem? This presentation will dive deep
into vulnerability data and explore the source and spread of
these vulnerabilities through products as well as actions the
security research community and enterprise customers can
take to address this problem.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast