Click here to Skip to main content
15,896,557 members
Articles / All Topics

Interpreting the Results of a Vulnerability Assessment: How to Focus on What's Important in Your Web Application Security Testing

Rate me:
Please Sign up or sign in to vote.
4.20/5 (2 votes)
7 Mar 2007CPOL6 min read 15.2K   6  
The results of an extensive vulnerability assessment of a Web application can appear extensive on first review. However, many Web application security holes found by such an assessment may in fact not matter to an organization’s specific situation. Learn more about how to weed through such findings.

Alternatives

Members may post updates or alternatives to this current article in order to show different approaches or add new features.

No alternatives have been posted.

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


Written By
Web Developer
United States United States
Caleb Sima is the co-founder of SPI Dynamics, a Web application security products company. He currently serves as the CTO and director of SPI Labs, SPI Dynamics' R&D security team. Prior to co-founding SPI Dynamics, Caleb was a member of the elite X-Force R&D team at Internet Security Systems, and worked as a security engineer for S1 Corporation. Caleb is a regular speaker and press resource on Web application security testing methods and has contributed to (IN)Secure Magazine, Baseline Magazine and been featured in the Associated Press.

Comments and Discussions