Best Practices When Implementing Web Application Scanning into an SDLC

May 30, 2017 Matt Wilgus

Web application scanning, a type of dynamic application security testing (DAST), is an important component for organizations looking to provide a secure online offering to their clients.

Unfortunately, the historical approach of “spider and scan” often does not meet expectations, leaving applications vulnerable. While this is sometimes due to scanning tools lagging or new technologies being deployed, it is more often the case that an organization’s approach has been done in haste, and the people, processes, and technologies in place are not properly configured.

This article will provide an overview on web application scanning, address some of the key areas to consider when implementing or updating a web application scanning program into a software development life cycle (SDLC), and how it can result in applications being more secure and compliance efforts requiring fewer resources.

Read the full article published in the May edition of the ISSA Journal >>

About the Author

Matt Wilgus

Matt Wilgus is a Principal at Schellman, where he heads the delivery of Schellman’s penetration testing services related to FedRAMP and PCI assessments, as well as other regulatory and compliance programs. Matt has over 20 years’ experience in information security, with a focus on identifying, exploiting and remediating vulnerabilities. In addition, he has vast experience enhancing client security programs while effectively meeting compliance requirements. Matt has a strong background in network and application penetration testing, although over the past 10 years most of his focus has been on the application side, with extensive experience testing some of the most well-known IaaS, PaaS and SaaS providers.

More Content by Matt Wilgus
Previous Flipbook
Penetration Testing
Penetration Testing

Next Article
Phishing: Season is Open All Year Long
Phishing: Season is Open All Year Long

Employees are one of the weakest links in any business’ security defenses, especially if there i...