VULNERABILITY N+1
VULNERABILITY N+1. AUTHOR: Terry Kurzynski, CISSP, CISA, PCI QSA, ISO 27001 AUDITOR
As Americans, we love lists. That fact is self-evident when browsing our favorite blog sites, as many blogs start out with catchy headlines like, “The Top 5 ______ (fill in the blank).” The love of lists is rooted deeply in our culture. We loved the Top 40 countdown for generations when it came to the hottest songs on the radio. Every New Year’s Eve we anticipate the unveiling of the Top X of all types of erroneous information concerning the past year. David Letterman made a living with a nightly “Top 10 Reasons” segment of his show. Lists are concise, abbreviated, and fun. It’s no wonder why this adoration for lists is carried into how we approach cyber security. Every three years or so, we look for the unveiling of the OWASP Top 10 Most Critical Application Security Risks because it compiles all those nasty potential risks and vulnerabilities into one simple list. (more…)