Should a security professional have a preference when both have
different value propositions? While there is overlap, a static analysis
tool can find things that pen testing tools cannot. Likewise, a pen test
can report on secure applications deployed insecurely which is not
visible to static analysis.
 
So, the best answer is I prefer both...
 
http://twitter.com/mcgoverntheory

________________________________

From: sc-l-boun...@securecoding.org
[mailto:sc-l-boun...@securecoding.org] On Behalf Of Matt Parsons
Sent: Thursday, April 15, 2010 5:50 PM
To: 'Matt Parsons'; SC-L@securecoding.org
Cc: webapp...@securityfocus.com; owaspdal...@utdallas.edu; 'Webappsec
Group'
Subject: Re: [SC-L] What do you like better Web penetration testing
orstatic code analysis?



What do you like doing better as application security professionals, web
penetration testing or static code analysis?

 

I offered my thoughts in today's blog.   

 

http://parsonsisconsulting.blogspot.com/2010/04/what-do-you-like-better-
secure-code.html

 

 

 

Matt Parsons, MSM, CISSP

315-559-3588 Blackberry

817-294-3789 Home office 

"Do Good and Fear No Man"  

Fort Worth, Texas

A.K.A The Keyboard Cowboy

mailto:mparsons1...@gmail.com <mailto:mparsons1...@gmail.com> 

http://www.parsonsisconsulting.com <http://www.parsonsisconsulting.com> 

http://www.o2-ounceopen.com/o2-power-users/
<http://www.o2-ounceopen.com/o2-power-users/> 

http://www.linkedin.com/in/parsonsconsulting
<http://www.linkedin.com/in/parsonsconsulting> 

http://parsonsisconsulting.blogspot.com/
<http://parsonsisconsulting.blogspot.com/> 

http://www.vimeo.com/8939668 <http://www.vimeo.com/8939668> 

 

 

 

 

 

 

 

 

 

 

 

 

 

************************************************************
This communication, including attachments, is for the exclusive use of 
addressee and may contain proprietary, confidential and/or privileged 
information.  If you are not the intended recipient, any use, copying, 
disclosure, dissemination or distribution is strictly prohibited.  If you are 
not the intended recipient, please notify the sender immediately by return 
e-mail, delete this communication and destroy all copies.
************************************************************

<<image003.jpg>>

<<image004.jpg>>

_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________

Reply via email to