Industry News Coverage - 2009 Archive
Industry News Coverage - 2009 Archive
Below is a comprehensive monthly review of the news and other media's coverage of CWE. A brief summary of each news item is listed with its title, author (if identified), date, and media source.
October 2009
October 2009
SearchCIO, October 23, 2009
CWE was mentioned in an article about the recently formed Consortium for IT Software Quality (CISQ) entitled "CISQ plans software quality standards" in SearchCIO on October 19, 2009. CWE was mentioned when the author referenced William Curtis, Director of CISQ: "Curtis said CISQ will also leverage the security world's body of work on good coding practices, the Common Weakness Enumeration (CWE), a community-developed dictionary of software weakness types maintained by MITRE. Curtis said CISQ will 'look at bad coding for all kinds of coding issues, and we need a common, defined way of how to represent a violation, which is what the OMG will work on.' Ideally, he said, companies will be able to leverage the standards to build technology that looks for and identifies patterns of quality violations in the code. And the CISQ will develop a certification for those providing services to assess the quality of IT application software, based on the standards."
The article was written by Colleen Frye.
September 2009
September 2009
Government Computer News, September 23, 2009
CWE was mentioned in an article about CVE's 10-year anniversary entitled "CVE: Ten years and more than 38,000 vulnerabilities catalogued," published in Government Computer News on September 23, 2009. CWE was mentioned by the author when he explains how the success of CVE inspired follow-on efforts such as CWE and its Top 25 list. The article also includes quotes from CWE Program Lead and CVE Compatibility Lead Robert A. Martin and CWE Technical Lead and CVE Co-Creator and Technical Lead Steve Christey.
The article was written by William Jackson.
IEEE Security and Privacy, May/June 2009
CWE was the main topic of an article entitled "Improving Software Security by Eliminating the CWE Top 25 Vulnerabilities" in the May/June 2009 issue of IEEE Security and Privacy. The article, which may be downloaded from the IEEE Web site for a fee, provides best practices for specific weaknesses identified in the article by their CWE-IDs that can help users eliminate the CWE Top 25 vulnerabilities in their own development environment and products.
The article was written by Michael Howard.
DarkReading.com, April 8, 2009
CWE Technical Lead Steve Christey was quoted in an article entitled "The Rocky Road To More Secure Code" on DarkReading.com on April 8, 2009: "Steve Christey, principal information security engineer for MITRE, who also works on the Common Vulnerability and Exposures (CVE) [and CWE programs], says CVE data shows vulnerabilities in major software products, such as those from Microsoft, are becoming less rampant. "Vulnerabilities in products from major vendors like Microsoft still get announced every month. But it's often very difficult to detect [these vulnerabilities], and they require a large amount of time and investment from the people who discover them. That's one way to measure that software is becoming more secure: It's taking longer to find significant vulnerabilities in software." Christey says the good news is these more obscure bugs are more difficult to detect and, therefore, more difficult and expensive to exploit. The bad news is that has put the bull's eye on third-party applications, especially in the Web 2.0 space: "Web 2.0 doesn't have a culture of security from the moment of conception of an idea all the way to deployment," he says. "Software assurance needs to be a holistic approach that crosses all phases of development. But many of the third-party developers have not gone down this road."
February 2009
February 2009
SANS Web Site, January 23, 2009
CWE was mentioned in Draft 1.0 of the "Twenty Most Important Controls and Metrics for Effective Cyber Defense and Continuous FISMA Compliance" consensus list released by a consortium of federal agencies and private organizations on February 23, 2009. The document, which uses "knowledge of actual attacks and defines controls that would have stopped those attacks from being successful," includes 15 critical controls that are subject to automated measurement and validation and an additional 5 critical controls that are not.
CWE is mentioned as follows in a section about why the list is so important for chief information security officers (CISOs), chief information officers (CIOs), federal inspectors general, and auditors: "This effort also takes advantage of the success and insights from the development and usage of standardized concepts for identifying, communicating, and documenting security-relevant characteristics/data. These standards include the following: common identification of vulnerabilities (Common Vulnerabilities and Exposures-CVE), definition of secure configurations (Common Configuration Enumeration-CCE), inventory of systems and platforms (Common Platform Enumeration-CPE), vulnerability severity (Common Vulnerability Scoring System-CVSS) and identification of application weaknesses (Common Weaknesses Enumeration-CWE). These standards have emerged over the last decade through collaborative research and deliberation between government, academia and industry. While still evolving, several of these efforts in standardization have made their way into commercial solutions and government, industry, and academic usage. Perhaps most visible of these has been the Federal Desktop Core Configuration (FDCC) which leveraged the Security Content Automation Program (SCAP)."
The draft is available for public review and comment at www.sans.org/cag, www.csis.org, and www.gilligangroupinc.com until March 23, 2009.
January 2009
January 2009
CWE/SANS Top 25 Programming Errors List Receives Extensive News Coverage
CWE and the SANS Institute posted the completed 2009 CWE/SANS Top 25 Programming Errors on the CWE and SANS Web sites on January 12, 2009. A collaboration between the SANS Institute, MITRE, and over 40 top software security experts in the U.S. and Europe, the list provides detailed descriptions of the top 25 programming errors along with authoritative guidance for mitigating and avoiding them.
The release received extensive news media coverage:
- "Targeting the 25 Most Dangerous Programming Errors," MITRE Digest, February 4, 2009
- "Are you a dangerous programmer?" iTWire, January 14, 2009
- "Coalition of Cybersecurity Organizations Reveals 25 Most Dangerous Programming Errors," Security Management, January 14, 2009
- "25 most dangerous software coding errors that help cyber criminals revealed," Sindh Today, January 14, 2009
- "The 25 most dangerous programming errors," heise online, January 14, 2009
- "New York drafts language demanding secure code," SearchSecurity.com, January 14, 2009
- "New York Plans Application Security Program: Developers must straighten up and fly right if they want to do business with the Empire State," InternetNews.com, January 14, 2009
- "Top 25 dangerous programming errors identified by panel of experts," SC Magazine, January 13, 2009
- "Tech project finds Top 25 coding flaws that let hackers in," USA Today, January 13, 2009
- "Dangerous coding errors revealed," BBC News, January 13, 2009
- "NSA helps name most dangerous programming mistakes," Macworld, January 13, 2009
- "Group releases list to kill most-dangerous bugs," SecurityFocus, January 13, 2009
- "Experts trumpet '25 most dangerous' programming errors," The Register, January 13, 2009
- "Update: The 25 greatest coding threats," ComputerworldUK, January 13, 2009
- "Cyber Security Alert: Top 25 Software Writing Blunders," Scientific American, January 13, 2009
- "NSA helps name most dangerous programming mistakes," InfoWorld, January 13, 2009
- "Software development gets 25 most dangerous coding mistakes list," Geek.com, January 13, 2009
- "Experts reveal top 25 programming errors," vnunet.com, January 13, 2009
- "Security experts name top 25 programming screw-ups," ARN.com, January 13, 2009
- "Security Group SANS Exposes 25 "Most Wanted" Coding Errors," ITProPortal.com, January 13, 2009
- "Experts reveal top 25 programming blunders," PC Pro, January 13, 2009
- "Top 25 common coding errors that brought down websites," neowin.net, January 13, 2009
- "Security Group SANS Exposes 25 "Most Wanted" Coding Errors," SecurityProPortal.com, January 13, 2009
- "Industry agrees on top 25 software errors," ITExaminer.com, January 13, 2009
- "The 25 most dangerous programming errors," heise Security UK, January 13, 2009
- "25 most dangerous programming errors," Tech Republic, January 13, 2009
- "2009 CWE/SANS Top 25 Most Dangerous Programming Errors," swbusiness.fi, January 13, 2009
- "One big step toward a safer Internet," Zero Day Threat, January 13, 2009
- "Software [In]security: Top 11 Reasons Why Top 10 (or Top 25) Lists Don’t Work," informIT, January 13, 2009
- "Top 25 coding defects listed, surprising nobody with a clue," ZDNet, January 13, 2009
- "Top 25 Programming Errors Released," eFluxMedia.com, January 13, 2009
- "Dangerous Programming Errors Exposed," eFluxMedia.com, January 13, 2009
- "Software giants list 25 greatest net threats," PC Advisor, January 13, 2009
- "Top 25 programming errors revealed," ITPro, January 13, 2009
- "Are You Vulnerable to These Top 25 Coding Errors?" DaniWeb, January 13, 2009
- "25 dangerous programming errors made public," MX Logic, January 13, 2009
- "Top 25 dangerous programming errors identified by panel of experts," SC Magazine UK, January 13, 2009
- "CWE/SANS Top 25 Programming Errors," InformationWeek, January 13, 2009
- "Top firms launch web coding error list," Bluhalo, January 13, 2009
- "Top 25 coding errors listed," New Electronics, January 13, 2009
- "Top 25 Software Programming Errors," CIO, January 12, 2009
- "DHS, Microsoft, others release Top 25 programming blunders," SC Magazine, January 12, 2009
- "Top 25 software screw-ups," Network World, January 12, 2009
- "NSA, DHS, Industry Gang Up on Dangerous Software Errors," Business Week, January 12, 2009
- "Hack-Proofing Software," Forbes, January 12, 2009
- "Will Top 25 list of software errors rescue you from rotten software?" Network World, January 12, 2009
- "Security Experts ID Top 25 Programming Errors," Network World, January 12, 2009
- "NSA helps name most dangerous programming mistakes," Network World, January 12, 2009
- "List of Most Dangerous Programming Errors Changes IT Security Discussion," eWeek.com, January 12, 2009
- "Report Names Top 25 Worst Programming Errors," eWeek.com, January 12, 2009
- "25 Most Dangerous Programming Errors Exposed," InformationWeek, January 12, 2009
- "Update: The 25 greatest coding threats," Computerworld, January 12, 2009
- "Groups list most dangerous software programming errors," Federal Computer Week, January 12, 2009
- "Error correcting software from the beginning," Government Computer News, January 12, 2009
- "NSA initiative pinpoints 25 Top coding errors," ZDNet Government, January 12, 2009
- "SANS Releases List Of Top 25 Most Dangerous Programming Errors In Software," Dark Reading, January 12, 2009
- "Security Wonks List Coders' Top 25 Worst Flubs," TechNewsWorld.com, January 12, 2009
- "Security experts identify 25 dangerous coding errors," SearchSecurity.com, January 12, 2009
- "Most dangerous programming mistakes fingered," TechWorld.com, January 12, 2009
- "Group Lists 25 Most Dangerous Coding Errors Hackers Exploit," CIO India, January 12, 2009
- "Security experts identify 25 dangerous coding errors," SearchSecurity.com, January 12, 2009
- "Security Experts ID Top 25 Programming Errors," CSO, January 12, 2009
- "Groups release top 25 programming errors to improve cybersecurity," NextGov.com, January 12, 2009
- "The 25 most dangerous programming screw-ups…. ever!" TechBlorge.com, January 12, 2009
- "More than Coding Mistakes at Fault in Bad Software," InformationWeek, January 12, 2009
- "25 Most Dangerous Programming Errors Exposed," InformationWeek, January 12, 2009
- "CWE/SANS top 25 most dangerous programming errors," Help Net Security, January 12, 2009
- "The 25 Most Dangerous Programming Errors," Bank Info Security, January 12, 2009
- "Experts reveal 25 coding errors that let in hackers," ComputerWeekly.com, January 12, 2009
- "Unveiled: Top 25 most dangerous code errors," Public Technology, January 12, 2009
- "Most Dangerous Programming Errors," Redmond Developer News, January 12, 2009
- "Avoiding the Most Common Programming Errors," InternetNews.com, January 12, 2009
- "Groups Release List of 25 Most Dangerous Programming Errors," IT Business Edge, January 12, 2009
More information is available — Please edit the custom filter or select a different filter.
|