SlideShare a Scribd company logo
© 2016 Denim Group – All Rights Reserved
Create a Unified View of Your Application
Security Program – Black Duck Hub and
ThreadFix
December 16th, 2016
Dan Cornell
CTO, Denim Group
Mike Pittenger
Vice President of Security Strategy, Black Duck
© 2016 Denim Group – All Rights Reserved
Agenda
• State of Application Security
• Black Duck Hub Overview
• ThreadFix Overview
• ThreadFix / Black Duck Hub Integration
• Components: Open Source and Internal
8 of the top 10
Software Companies
(70 of the top 100)
6 of the top 8
Mobile Handset Vendors
6 of the top 10
Investment Banks
24
Countries
250+
Employees
2,000Customers
About Black Duck
40Founded
2002
Of The Fortune
100
Up to 90%
Open Source
TODAY
50%
Open Source
2010
20%
Open Source
20051998
10%
Open Source
Open Source Changed the Way Applications are Built
Custom & Commercial Code
Open Source Software
Source
Open Source is the modern architecture
OpenSSL
Introduced: 2011
Discovered: 2014
Heartbleed
GNU C Library
Introduced: 2000
Discovered: 2015
Ghost
QEMU
Introduced: 2004
Discovered: 2015
Venom
Bash
Introduced: 1989
Discovered: 2014
Shellshock
OpenSSL
Introduced: 1990's
Discovered: 2015
Freak
FREAK!
Consequences Can Be Costly When You Can’t Control What
You Can’t See
Black Duck Open Source Security Audit Report
Highlights Security & Management Challenges
Why Aren’t We Finding These in Testing?
• Static analysis
• Testing of source code or binaries for unknown security vulnerabilities in custom code
• Advantages in buffer overflow, some types of SQL injection
• Provides results in source code
• Dynamic analysis
• Testing of compiled application in a staging environment to detect unknown security
vulnerabilities in custom code
• Advantages in injection errors, XSS
• Provides results by URL, must be traced to source
What’s Missing?
• Automated testing finds common vulnerabilities
in the code you write
• They are good, not perfect
• Different tools work better on different
classes of bugs
• Many types of bugs are undetectable except
by trained security researchers
There Are No Perfect Answers
All possible
security vulnerabilities
FREAK!
Identifiab
le with
Static
Analysis
Identifiab
le with
Dynamic
Analysis
0
500
1000
1500
2000
2500
3000
3500
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
The Threat Landscape Constantly Changes
National Vulnerability Database (NVD) Black Duck Extended Vulnerability Data (EVD)
• VulnDB (Open Source Vulnerability Database)
• In 2015, over 3,000 new vulnerabilities in open source
• Since 2004, over 74,000 vulnerabilities have been disclosed by NVD.
• 63 reference automated tools
• 50 of those are for vulnerabilities reported in the tools
• 13 are for vulnerabilities that could be identified by a fuzzer
DEVELOPER DOWNLOADS
OUTSOURCED DEVELOPMENT
THIRD PARTY LIBRARIES
CODE REUSE
APPROVED COMPONENTS
COMMERCIAL APPS
OPEN SOURCE CODE
We Have Little Control Over How
Open Source Enters The Code Base
To manage open source risks you need an end-to-end approach
INVENTORY
Open Source
Components
in Your Code
MAP
Components
to Known
Vulnerabilities
IDENTIFY
License &
Code Quality
Risks
TRACK
Policy Violations
& Remediation
Progress
ALERT
When New
Vulnerabilities
Affect Your Code
Automation and policy management
Integration with DevOps tools and processes
Black Duck Provides Visibility and Control
Vulnerability Information and Alerts
Key Takeaways
• Open source is here to stay (and growing)
• Open source saves development costs and accelerates time to
market
• Open Source Security isn’t covered by traditional tools
• Static analysis is good, but doesn't help with open source
vulnerabilities
• Identify open source with known vulnerabilities, early in the SDL
• New paradigm requires new methodologies
• Visibility to open source and continuous monitoring is required.
© 2016 Denim Group – All Rights Reserved
ThreadFix Overview
• Create a consolidated view of your
applications and vulnerabilities
• Prioritize application risk decisions based on
data
• Translate vulnerabilities to
developers in the tools they
are already using
© 2016 Denim Group – All Rights Reserved
ThreadFix Overview
© 2016 Denim Group – All Rights Reserved
Create a consolidated view of
your applications and
vulnerabilities
© 2016 Denim Group – All Rights Reserved
Application Portfolio Tracking
© 2016 Denim Group – All Rights Reserved
Vulnerability Import
© 2016 Denim Group – All Rights Reserved
Vulnerability Consolidation
© 2016 Denim Group – All Rights Reserved
Prioritize application risk
decisions based on data
© 2016 Denim Group – All Rights Reserved
Vulnerability Prioritization
© 2016 Denim Group – All Rights Reserved
Reporting and Metrics
© 2016 Denim Group – All Rights Reserved
Translate vulnerabilities to
developers in the tools they
are already using
© 2016 Denim Group – All Rights Reserved
Defect Tracker Integration
© 2016 Denim Group – All Rights Reserved
ThreadFix / Black Duck Hub
Integration
© 2016 Denim Group – All Rights Reserved
ThreadFix HotSpot Technology
© 2016 Denim Group – All Rights Reserved
ThreadFix
www.threadfix.it
Black Duck Hub
www.blackducksoftware.com
Questions and Contact
© 2016 Denim Group – All Rights Reserved
About Denim Group
Denim Group is the leading secure software development firm,
serving as a trusted advisor on matters of software risk and security.
Our flagship ThreadFix product accelerates the process of software
vulnerability remediation, reflecting the company's understanding of
what it takes to fix application vulnerabilities faster.

More Related Content

PPTX
Microsoft azure
PPTX
Radware - WAF (Web Application Firewall)
PDF
CMDBあれこれ
PDF
Microsoft Azure Active Directory
PPTX
Cisco umbrella youtube
PPT
Openstack swift - VietOpenStack 6thmeeetup
PPTX
Zero trust deck 2020
PDF
F5 DDoS Protection
Microsoft azure
Radware - WAF (Web Application Firewall)
CMDBあれこれ
Microsoft Azure Active Directory
Cisco umbrella youtube
Openstack swift - VietOpenStack 6thmeeetup
Zero trust deck 2020
F5 DDoS Protection

What's hot (20)

PDF
DDoS Attack Preparation and Mitigation
PPTX
Close your security gaps and get 100% of your traffic protected with Cloudflare
PPTX
Azure Infrastructure as Code and Hashicorp Terraform
PDF
Cloud Computing Using OpenStack
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
PDF
AWS Black Belt Techシリーズ AWS Direct Connect
PDF
VMware NSX - Lessons Learned from real project
PDF
Azure Security Overview
PDF
Five Connectivity and Security Use Cases for Azure VNets
PPTX
ISO 27001 Bilgi Güvenliği Yönetim Sistemi
PDF
AWS Summit Seoul 2023 | 새로운 금융 서비스 출시 시 Agility 확보 방안
PDF
AWS Black Belt online seminar 2017 Snowball
DOCX
VERİTABANI SIZMA TESTLERİ
PDF
Özgür yazılımlarla DDOS Engelleme
PPTX
cn-series-se-presentation.pptx
PDF
Microsoft Windows Server 2022 Overview
PDF
Az 104 session 3 azure compute
PPTX
Implementando DRP en AWS
PPTX
CLOUD NATIVE SECURITY
PDF
Cybersecurity concepts & Defense best practises
DDoS Attack Preparation and Mitigation
Close your security gaps and get 100% of your traffic protected with Cloudflare
Azure Infrastructure as Code and Hashicorp Terraform
Cloud Computing Using OpenStack
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
AWS Black Belt Techシリーズ AWS Direct Connect
VMware NSX - Lessons Learned from real project
Azure Security Overview
Five Connectivity and Security Use Cases for Azure VNets
ISO 27001 Bilgi Güvenliği Yönetim Sistemi
AWS Summit Seoul 2023 | 새로운 금융 서비스 출시 시 Agility 확보 방안
AWS Black Belt online seminar 2017 Snowball
VERİTABANI SIZMA TESTLERİ
Özgür yazılımlarla DDOS Engelleme
cn-series-se-presentation.pptx
Microsoft Windows Server 2022 Overview
Az 104 session 3 azure compute
Implementando DRP en AWS
CLOUD NATIVE SECURITY
Cybersecurity concepts & Defense best practises
Ad

Viewers also liked (12)

PDF
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
PDF
What a locked down law firm looks like updated
PDF
Clear AppSec Visibility with AppSpider and ThreadFix
PDF
Enterprise Vulnerability Management: Back to Basics
PDF
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
PDF
Running a High-Efficiency, High-Visibility Application Security Program with...
PDF
ThreadFix 2.4: Maximizing the Impact of Your Application Security Resources
PDF
Optimizing Your Application Security Program with Netsparker and ThreadFix
PDF
SecDevOps: Development Tools for Security Pros
PDF
Running a Comprehensive Application Security Program with Checkmarx and Threa...
PDF
The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZA...
PDF
Monitoring Attack Surface to Secure DevOps Pipelines
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
What a locked down law firm looks like updated
Clear AppSec Visibility with AppSpider and ThreadFix
Enterprise Vulnerability Management: Back to Basics
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
Running a High-Efficiency, High-Visibility Application Security Program with...
ThreadFix 2.4: Maximizing the Impact of Your Application Security Resources
Optimizing Your Application Security Program with Netsparker and ThreadFix
SecDevOps: Development Tools for Security Pros
Running a Comprehensive Application Security Program with Checkmarx and Threa...
The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZA...
Monitoring Attack Surface to Secure DevOps Pipelines
Ad

Similar to Create a Unified View of Your Application Security Program – Black Duck Hub and ThreadFix (20)

PDF
Q1 2016 Open Source Security Report: Glibc and Beyond
PDF
Application Security in the Age of Open Source
PPTX
Secure application deployment in the age of continuous delivery
PPTX
Secure application deployment in the age of continuous delivery
PDF
Managing Your Application Security Program with the ThreadFix Ecosystem
PDF
3/ Black Duck @ OPEN'16
PDF
ThreadFix 2.1 and Your Application Security Program
PPTX
RVAsec Bill Weinberg Open Source Hygiene Presentation
PDF
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
PPTX
September 13, 2016: Security in the Age of Open Source:
PDF
ThreadFix 2.2 Preview Webinar with Dan Cornell
PPTX
OSS has taken over the enterprise: The top five OSS trends of 2015
PDF
Building Blocks of Secure Development: How to Make Open Source Work for You
PPTX
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
PPTX
Software Security Assurance for DevOps
PPTX
Software Security Assurance for Devops
PPTX
(Isc)² secure johannesburg
PDF
комплексная защита от современных интернет угроз с помощью Check point sandblast
PPTX
Scalar Security Roadshow - Calgary Presentation
PPTX
Scalar Security Roadshow - Vancouver Presentation
Q1 2016 Open Source Security Report: Glibc and Beyond
Application Security in the Age of Open Source
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
Managing Your Application Security Program with the ThreadFix Ecosystem
3/ Black Duck @ OPEN'16
ThreadFix 2.1 and Your Application Security Program
RVAsec Bill Weinberg Open Source Hygiene Presentation
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
September 13, 2016: Security in the Age of Open Source:
ThreadFix 2.2 Preview Webinar with Dan Cornell
OSS has taken over the enterprise: The top five OSS trends of 2015
Building Blocks of Secure Development: How to Make Open Source Work for You
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps
Software Security Assurance for Devops
(Isc)² secure johannesburg
комплексная защита от современных интернет угроз с помощью Check point sandblast
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Vancouver Presentation

More from Denim Group (20)

PDF
Long-term Impact of Log4J
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PDF
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
PDF
Application Asset Management with ThreadFix
PDF
OWASP San Antonio Meeting 10/2/20
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
PDF
Using Collaboration to Make Application Vulnerability Management a Team Sport
PDF
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
PDF
Security Champions: Pushing Security Expertise to the Edges of Your Organization
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
PDF
An Updated Take: Threat Modeling for IoT Systems
PPTX
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
PDF
A New View of Your Application Security Program with Snyk and ThreadFix
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
PDF
AppSec in a World of Digital Transformation
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
PDF
AppSec in a World of Digital Transformation
PDF
Enumerating Enterprise Attack Surface
Long-term Impact of Log4J
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Application Asset Management with ThreadFix
OWASP San Antonio Meeting 10/2/20
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Using Collaboration to Make Application Vulnerability Management a Team Sport
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Security Champions: Pushing Security Expertise to the Edges of Your Organization
The As, Bs, and Four Cs of Testing Cloud-Native Applications
An Updated Take: Threat Modeling for IoT Systems
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
A New View of Your Application Security Program with Snyk and ThreadFix
Enabling Developers in Your Application Security Program With Coverity and Th...
AppSec in a World of Digital Transformation
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Enabling Developers in Your Application Security Program With Coverity and Th...
AppSec in a World of Digital Transformation
Enumerating Enterprise Attack Surface

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Big Data Technologies - Introduction.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Cloud computing and distributed systems.
PDF
KodekX | Application Modernization Development
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
MYSQL Presentation for SQL database connectivity
Review of recent advances in non-invasive hemoglobin estimation
Big Data Technologies - Introduction.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
Unlocking AI with Model Context Protocol (MCP)
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Understanding_Digital_Forensics_Presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Cloud computing and distributed systems.
KodekX | Application Modernization Development
Chapter 3 Spatial Domain Image Processing.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Create a Unified View of Your Application Security Program – Black Duck Hub and ThreadFix

  • 1. © 2016 Denim Group – All Rights Reserved Create a Unified View of Your Application Security Program – Black Duck Hub and ThreadFix December 16th, 2016 Dan Cornell CTO, Denim Group Mike Pittenger Vice President of Security Strategy, Black Duck
  • 2. © 2016 Denim Group – All Rights Reserved Agenda • State of Application Security • Black Duck Hub Overview • ThreadFix Overview • ThreadFix / Black Duck Hub Integration • Components: Open Source and Internal
  • 3. 8 of the top 10 Software Companies (70 of the top 100) 6 of the top 8 Mobile Handset Vendors 6 of the top 10 Investment Banks 24 Countries 250+ Employees 2,000Customers About Black Duck 40Founded 2002 Of The Fortune 100
  • 4. Up to 90% Open Source TODAY 50% Open Source 2010 20% Open Source 20051998 10% Open Source Open Source Changed the Way Applications are Built Custom & Commercial Code Open Source Software Source Open Source is the modern architecture
  • 5. OpenSSL Introduced: 2011 Discovered: 2014 Heartbleed GNU C Library Introduced: 2000 Discovered: 2015 Ghost QEMU Introduced: 2004 Discovered: 2015 Venom Bash Introduced: 1989 Discovered: 2014 Shellshock OpenSSL Introduced: 1990's Discovered: 2015 Freak FREAK! Consequences Can Be Costly When You Can’t Control What You Can’t See
  • 6. Black Duck Open Source Security Audit Report Highlights Security & Management Challenges
  • 7. Why Aren’t We Finding These in Testing? • Static analysis • Testing of source code or binaries for unknown security vulnerabilities in custom code • Advantages in buffer overflow, some types of SQL injection • Provides results in source code • Dynamic analysis • Testing of compiled application in a staging environment to detect unknown security vulnerabilities in custom code • Advantages in injection errors, XSS • Provides results by URL, must be traced to source What’s Missing?
  • 8. • Automated testing finds common vulnerabilities in the code you write • They are good, not perfect • Different tools work better on different classes of bugs • Many types of bugs are undetectable except by trained security researchers There Are No Perfect Answers All possible security vulnerabilities FREAK! Identifiab le with Static Analysis Identifiab le with Dynamic Analysis
  • 9. 0 500 1000 1500 2000 2500 3000 3500 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 The Threat Landscape Constantly Changes National Vulnerability Database (NVD) Black Duck Extended Vulnerability Data (EVD) • VulnDB (Open Source Vulnerability Database) • In 2015, over 3,000 new vulnerabilities in open source • Since 2004, over 74,000 vulnerabilities have been disclosed by NVD. • 63 reference automated tools • 50 of those are for vulnerabilities reported in the tools • 13 are for vulnerabilities that could be identified by a fuzzer
  • 10. DEVELOPER DOWNLOADS OUTSOURCED DEVELOPMENT THIRD PARTY LIBRARIES CODE REUSE APPROVED COMPONENTS COMMERCIAL APPS OPEN SOURCE CODE We Have Little Control Over How Open Source Enters The Code Base
  • 11. To manage open source risks you need an end-to-end approach INVENTORY Open Source Components in Your Code MAP Components to Known Vulnerabilities IDENTIFY License & Code Quality Risks TRACK Policy Violations & Remediation Progress ALERT When New Vulnerabilities Affect Your Code Automation and policy management Integration with DevOps tools and processes
  • 12. Black Duck Provides Visibility and Control
  • 14. Key Takeaways • Open source is here to stay (and growing) • Open source saves development costs and accelerates time to market • Open Source Security isn’t covered by traditional tools • Static analysis is good, but doesn't help with open source vulnerabilities • Identify open source with known vulnerabilities, early in the SDL • New paradigm requires new methodologies • Visibility to open source and continuous monitoring is required.
  • 15. © 2016 Denim Group – All Rights Reserved ThreadFix Overview • Create a consolidated view of your applications and vulnerabilities • Prioritize application risk decisions based on data • Translate vulnerabilities to developers in the tools they are already using
  • 16. © 2016 Denim Group – All Rights Reserved ThreadFix Overview
  • 17. © 2016 Denim Group – All Rights Reserved Create a consolidated view of your applications and vulnerabilities
  • 18. © 2016 Denim Group – All Rights Reserved Application Portfolio Tracking
  • 19. © 2016 Denim Group – All Rights Reserved Vulnerability Import
  • 20. © 2016 Denim Group – All Rights Reserved Vulnerability Consolidation
  • 21. © 2016 Denim Group – All Rights Reserved Prioritize application risk decisions based on data
  • 22. © 2016 Denim Group – All Rights Reserved Vulnerability Prioritization
  • 23. © 2016 Denim Group – All Rights Reserved Reporting and Metrics
  • 24. © 2016 Denim Group – All Rights Reserved Translate vulnerabilities to developers in the tools they are already using
  • 25. © 2016 Denim Group – All Rights Reserved Defect Tracker Integration
  • 26. © 2016 Denim Group – All Rights Reserved ThreadFix / Black Duck Hub Integration
  • 27. © 2016 Denim Group – All Rights Reserved ThreadFix HotSpot Technology
  • 28. © 2016 Denim Group – All Rights Reserved ThreadFix www.threadfix.it Black Duck Hub www.blackducksoftware.com Questions and Contact
  • 29. © 2016 Denim Group – All Rights Reserved About Denim Group Denim Group is the leading secure software development firm, serving as a trusted advisor on matters of software risk and security. Our flagship ThreadFix product accelerates the process of software vulnerability remediation, reflecting the company's understanding of what it takes to fix application vulnerabilities faster.