{"id":3465,"date":"2017-04-12T01:00:25","date_gmt":"2017-04-12T05:00:25","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/?p=3465"},"modified":"2017-04-12T01:00:25","modified_gmt":"2017-04-12T05:00:25","slug":"owasp-top-10-update-long-overdue-or-same-old-same-old","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/2017\/04\/12\/owasp-top-10-update-long-overdue-or-same-old-same-old\/","title":{"rendered":"OWASP Top 10 Update: Long Overdue Or Same-Old, Same-Old?"},"content":{"rendered":"<p>This week, OWASP released a working draft of its latest OWASP Top 10 vulnerabilities list. This is the first time that changes were made on this industry benchmark list in four years, even though many of the vulnerabilities remain the same. OWASP Top 10 is designed to help developers, designers, architects and business owners avoid risks associated with the most common vulnerabilities and provide standards for prioritizing vulnerability mitigation. The greatest change of 2017 Top 10 is the addition of application programing interfaces (APIs), and it could potentially help raise more awareness about API security. However, some would think that the Top 10 list is not evolving quickly enough to keep up with the pace of the changes in how software is delivered, and thus unable to cover the changing trends. On the other side, some think that there\u2019s no need to update the list every year because the strong similarities mean that the trend does not change that quickly.<\/p>\n<p>Link:\u00a0<a href=\"http:\/\/www.darkreading.com\/application-security\/owasp-top-10-update-long-overdue-or-same-old-same-old\/d\/d-id\/1328608\">http:\/\/www.darkreading.com\/application-security\/owasp-top-10-update-long-overdue-or-same-old-same-old\/d\/d-id\/1328608<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week, OWASP released a working draft of its latest OWASP Top 10 vulnerabilities list. This is the first time that changes were made on this industry benchmark list in four years, even though many of the vulnerabilities remain the same. OWASP Top 10 is designed to help developers, designers, architects and business owners avoid [&hellip;]<\/p>\n","protected":false},"author":11323,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[717225],"tags":[],"class_list":{"0":"post-3465","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-12-it-security","7":"entry"},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8j0Bl-TT","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/users\/11323"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/comments?post=3465"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3465\/revisions"}],"predecessor-version":[{"id":3466,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3465\/revisions\/3466"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/media?parent=3465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/categories?post=3465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/tags?post=3465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}