Q: Ryan, in a recent blog you talked about OWASP planning to highlight the need for organizations to have some sort of a Web Application Firewall (WAF) and a Runtime Application Self-Protection (RAS) capability. Why have these capabilities become so crucial for enterprises?
That's a great question. If you look at application security comprehensively, WAF and RASP capabilities are the mitigation elements of [application security], complementing the identification and remediation of vulnerabilities provided by other application security solutions. WAF and RASP technologies offer a temporary stopgap while the organization fixes the vulnerable issue. Without this mitigation technology, organizations would be vulnerable to an attack from the moment the code is released and the vulnerability found, to the time the vulnerability is fixed, passes QA and is released into production. This time gap can be quite substantial given the complexity of the vulnerability and the resources in the organization to fix it.
In our own annual stats report we've found that, year after year, it's taking months to remediate vulnerabilities. In the 2016 report, we found it took enterprises an average of 150 days to fix a vulnerability. That's five months! As I mentioned in the blog you referenced, the security industry needs to get in the development mindset and become much more agile to changing threats. If WAFs and RASP technology can help organizations become more agile in their reaction to threats by mitigating them and reducing the load on the remediation effort, that's a win. A vulnerability open for any amount of time represents a huge danger to a company. The quicker we can mitigate that vulnerability the better. WAFs and RASPs allow an organization to have some time to properly fix a vulnerability while still mitigating the risk to the business.
Q: Eric, why did WhiteHat launch the WhiteHat Certified Secure Developer Program earlier this year? What specific issue is it that you are hoping to help organizations address via the program?
DevOps is becoming a very real phenomenon, and with the speed of application development and deployment accelerating to such a fast pace, it's becoming imperative that security be built into the development process. There's no time for security teams to test and report back to developers on vulnerabilities in code; developers have to take responsibility for security testing as they're writing code. But the challenge is, developers generally don't have any security training. You can build all the security capabilities you want into a developer's existing toolkit, but without some foundational training in application security, it's difficult for a developer to really incorporate it into their workflow.
WhiteHat launched its Certified Secure Developer Program to provide the foundational training developers need to be able to understand and fix security vulnerabilities and adopt secure coding best practices. We want to help cultivate the new generation of DevSecOps practitioners and practices. With the proper training and easy access to a security solution that lives in the tools developers already use, developers can be the heroes that stop attackers from compromising an organization through its applications.
By offering our certification and training program for free, we're also hoping to eliminate any issues with regards to who pays for security training. When you're training developers and not security practitioners, is it the IT department that covers the cost of training? The Ops team? The security team? We don't want cost to be a barrier to securing the apps at the heart of the digital business.
Q: Ryan, talk to us about WhiteHat's Threat Research Center. How does it complement your current portfolio of products and how do customers benefit from it?
WhiteHat Security's Threat Research Center (TRC) team is comprised of 150 of the industry's top security experts who are a critical and integral component of the WhiteHat Application Security Platform. All vulnerabilities reported by the platform are verified by the TRC experts using cutting edge vulnerability tests and proprietary algorithms to ensure that our customers get actionable, confirmed results and near zero false positives. False positives and false negatives are inherent to automated appsec solutions. So the manual verification services built into our [Dynamic Application Security Testing], [Static Application Security Testing] and mobile solutions are highly valued by our customers, who would otherwise have to spend a lot of time and money on the resources to get to the real vulnerabilities they need to care about.
The TRC team is also available at any time to our customers through the "Ask a Question" feature in our platform. Anyone using the WhiteHat platform, whether it's a security practitioner or developer, can ask a question from within our product and get a response from a TRC member.
The TRC team also defines rulepacks that decide the conditions under which vulnerabilities should be flagged by the scanning engine. TRC engineers update these rules on a daily basis, keeping our appsec platform up-to-date and able to identify any late-breaking vulnerabilities and zero days.
In this era of DevSecOps, it's important to note that our TRC team supports any development model, including agile. Our platform is integrated with the most popular development tools and our TRC experts provide significant help to developers, who generally lack the kind of security expertise that would enable them to integrate security into their process.
Q: Eric, what are WhiteHat's plans at Black Hat USA 2017? What are you hoping attendees will learn about your company at the event?
WhiteHat will have a big presence at Black Hat this year, including a booth in the Business Hall (#840), leading two Workshop sessions, doing a joint presentation with F5 in their booth, and being a co-sponsor of the ZeroFox party at Skyfall. The show will give us a good opportunity to talk about WhiteHat and DevSecOps, and to collaborate with partners who are a critical part of the application security ecosystem.
I'm especially looking forward to the Workshops we'll be delivering on Wednesday afternoon, July 26, because we're going to share with participants a case study of a real organization that uses all of the tools of the application security trade to secure the entire SDLC. The organization at the center of this case study has seen dramatic improvements in the security of their applications, including many fewer vulnerabilities and much faster time-to-fix. Participants will take away a blueprint, based on this real-world case study, for engaging developers in the effort of securing applications throughout the SDLC.
We're also going to give workshop participants a "gift license" to the "OWASP Top 10 for Developers" computer-based training course that they can give to a developer in their organization towards the end goal of creating security advocates – and heroes – in the development organization.
Applications drive digital experiences. Almost everyone has digital experiences every day, whether at work, home or play. Between our booth programs and the Workshop session, we want Black Hat attendees who spend any time with us to understand in very concrete terms why and how an application security platform should be used to bridge the gap between security and development.