This might be of interest for this mailinglist too.

Cheers,

Christian

----- Forwarded message from Osama Elnaggar <oelnagga...@gmail.com> -----

Date: Mon, 10 Apr 2017 21:31:56 -0400
From: Osama Elnaggar <oelnagga...@gmail.com>
To: mod-security-us...@lists.sourceforge.net
Subject: [mod-security-users] OWASP Top 10 2017 RC1
Reply-To: mod-security-us...@lists.sourceforge.net

Hi,

Not sure if you guys saw this, but the new OWASP Top 10 (2017 RC1) was
released yesterday -
https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf


I found it interesting that under A7: Insufficient Attack Protection, it
specifically mentions looking into WAFs, RASP and OWASP AppSensor to detect
automatic attacks and block them.  This is the first time that the OWASP
Top 10 mentions WAFs as far as I can tell.

Perhaps this is a good for some ModSecurity marketing and promotion?

-- 
Osama Elnaggar

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot

_______________________________________________
mod-security-users mailing list
mod-security-us...@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/mod-security-users
Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs:
http://www.modsecurity.org/projects/commercial/rules/
http://www.modsecurity.org/projects/commercial/support/


----- End forwarded message -----

-- 
https://www.feistyduck.com/training/modsecurity-training-course
mailto:christian.fol...@netnea.com
twitter: @ChrFolini
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to