Artwork

Contenido proporcionado por HackerNoon. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente HackerNoon o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

What I Learned from Scanning Dozens of Small Government Websites (and Why the Same Bugs Keep Coming)

9:27
 
Compartir
 

Manage episode 524540643 series 3474671
Contenido proporcionado por HackerNoon. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente HackerNoon o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

This story was originally published on HackerNoon at: https://hackernoon.com/what-i-learned-from-scanning-dozens-of-small-government-websites-and-why-the-same-bugs-keep-coming.
What I found while scanning dozens of small U.S. government websites with an open-source tool — the same five security mistakes and how to fix them.
Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #web-security, #cybersecurity, #govtech-user-experience, #govtech, #opensource, #webdev, #devops, #legacy-cms, and more.
This story was written by: @civicmeshflow. Learn more about this writer by checking @civicmeshflow's about page, and for more stories, please visit hackernoon.com.
I built an open-source scanner and pointed it at small U.S. government websites. The same five security mistakes kept showing up: weak HTTPS, no CSP, leaky test files, insecure cookies and outdated JS – plus a simple baseline to fix them.

  continue reading

279 episodios

Artwork
iconCompartir
 
Manage episode 524540643 series 3474671
Contenido proporcionado por HackerNoon. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente HackerNoon o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

This story was originally published on HackerNoon at: https://hackernoon.com/what-i-learned-from-scanning-dozens-of-small-government-websites-and-why-the-same-bugs-keep-coming.
What I found while scanning dozens of small U.S. government websites with an open-source tool — the same five security mistakes and how to fix them.
Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #web-security, #cybersecurity, #govtech-user-experience, #govtech, #opensource, #webdev, #devops, #legacy-cms, and more.
This story was written by: @civicmeshflow. Learn more about this writer by checking @civicmeshflow's about page, and for more stories, please visit hackernoon.com.
I built an open-source scanner and pointed it at small U.S. government websites. The same five security mistakes kept showing up: weak HTTPS, no CSP, leaky test files, insecure cookies and outdated JS – plus a simple baseline to fix them.

  continue reading

279 episodios

ทุกตอน

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida

Escucha este programa mientras exploras
Reproducir