[Owasp-leaders] CWE/SANS Top 25 Most Dangerous Programming Errors
Mike Boberski
mike.boberski at cox.net
Mon Jan 12 19:48:12 EST 2009
I think there is a grossly disproportionate emphasis on implementation
errors in this space.
Mike
_____
From: owasp-leaders-bounces at lists.owasp.org
[mailto:owasp-leaders-bounces at lists.owasp.org] On Behalf Of Marcin
Wielgoszewski
Sent: Monday, January 12, 2009 3:33 PM
To: OWASP Leaders
Subject: [Owasp-leaders] CWE/SANS Top 25 Most Dangerous Programming Errors
Today SANS in conjunction with MITRE have released the CWE/SANS Top 25 Most
Dangerous Programming Errors [1].
It appears OWASP Foundation has made an official statement supporting this
initiative:
OWASP Foundation:
"When facing a huge application portfolio that could contain many thousands
of instances of over 700 different types of weaknesses, knowing where to
start is a daunting task. Done right, stamping out the CWE Top 25 can not
only make you significantly more secure but can cut your software
development costs."
- Jeff Williams, Aspect Security CEO and The OWASP Foundation Chair
[1] http://www.sans.org/top25errors/
Thoughts? How does this affect the OWASP Top 10 Project? I'll reserve
comment for the time being.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-leaders/attachments/20090112/7c90b1e3/attachment.html
More information about the OWASP-Leaders
mailing list