This might be of interest for this mailinglist too. Cheers,
Christian ----- Forwarded message from Osama Elnaggar <oelnagga...@gmail.com> ----- Date: Mon, 10 Apr 2017 21:31:56 -0400 From: Osama Elnaggar <oelnagga...@gmail.com> To: mod-security-us...@lists.sourceforge.net Subject: [mod-security-users] OWASP Top 10 2017 RC1 Reply-To: mod-security-us...@lists.sourceforge.net Hi, Not sure if you guys saw this, but the new OWASP Top 10 (2017 RC1) was released yesterday - https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf I found it interesting that under A7: Insufficient Attack Protection, it specifically mentions looking into WAFs, RASP and OWASP AppSensor to detect automatic attacks and block them. This is the first time that the OWASP Top 10 mentions WAFs as far as I can tell. Perhaps this is a good for some ModSecurity marketing and promotion? -- Osama Elnaggar ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ mod-security-users mailing list mod-security-us...@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/mod-security-users Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: http://www.modsecurity.org/projects/commercial/rules/ http://www.modsecurity.org/projects/commercial/support/ ----- End forwarded message ----- -- https://www.feistyduck.com/training/modsecurity-training-course mailto:christian.fol...@netnea.com twitter: @ChrFolini _______________________________________________ Owasp-modsecurity-core-rule-set mailing list Owasp-modsecurity-core-rule-set@lists.owasp.org https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set