Slide 11
Slide 11 text
“Security experts are going to have to figure out how to deliver
‘security as code’.
Essentially, they have to translate every security requirement,
every coding guideline, every ‘best practice,’ every threat model,
and every security architecture into code that can run during the
development, build, test, and deployment process.
Even in operations, it’s critical that attack detection and response
is fully automated.”
Jeff Williams
OWASP Top 10 project creator, about the (ex) A10 entry in OWASP Top 10.
https://sdtimes.com/owasp-adds-unprotected-apis-insufficient-attack-protection-top-ten-2017-release/
11