Security Market Segment LS
Monday, 29 November 2021 14:18

Musings on the OWASP Top 10 Featured


This year's OWASP Top 10 underwent some significant restructuring. A few vendors offered their thoughts.

The recently released OWASP Top 10 - a summary of the primary attack vectors used by ne'er-do-wells has taken a somewhat different approach than in previous years. As the report states, "This instalment of the Top 10 is more data-driven than ever but not blindly data-driven. We selected eight of the ten categories from contributed data and two categories from the Top 10 community survey at a high level. We do this for a fundamental reason, looking at the contributed data is looking into the past. AppSec researchers take time to find new vulnerabilities and new ways to test for them. It takes time to integrate these tests into tools and processes. By the time we can reliably test a weakness at scale, years have likely passed. To balance that view, we use an community survey to ask application security and development experts on the front lines what they see as essential weaknesses that the data may not show yet."

The report continues, "There are three new categories, four categories with naming and scoping changes, and some consolidation in the Top 10 for 2021. We've changed names when necessary to focus on the root cause over the symptom."

owasp changes

Matias Madou, Co-founder and CTO of Secure Code Warrior notes, "The latest OWASP Top 10 release revealed some significant shake-ups, with Injection flaws finally being knocked from the top spot in favour of Broken Access Control vulnerabilities. This is big news for sure, but the more important consideration is that the OWASP list is replacing most single attack techniques with entire families of vulnerabilities.

"It has become increasingly apparent that core security design is failing. This gives way to architectural vulnerabilities that can be advantageous to threat actors—especially if they go unpatched after the security flaw in a particular version of an application is made public.

"The trouble is, few engineers are given training that goes beyond the basics. Fewer still have their knowledge and practical application expanded beyond localised, code-level bugs that are typically developer-introduced in the first place. For every code-level weakness found, more complex architectural flaws will go unnoticed by most of the security tech stack, no matter how many automated shields and weapons are in the arsenal. The refreshed OWASP Top 10 list proves training horizons for developers need to expand rapidly to achieve what robots cannot."

A spokesperson from Skillsoft agrees, "Knowing learners are increasing the amount of security training they're doing is valuable, but it begs the question of where they're spending their time. Looking at the 10 most frequently completed security courses so far in 2021, OWASP Top 10 related lessons take the lead spot, followed by cloud security fundamentals, which could be attributed to the COVID-19 pandemic spurring a rapid global shift to the cloud."

"But," continues Madou, "like all things worth fighting for, the 2021 list represents a foundation the industry must build upon for truly top-notch security practices—not an end-game, and certainly not something that can happen overnight. The threat landscape is so fast-paced that there must be a deeper and more specific plan to upskill developers in security. Failure to do so will inevitably lead to missed opportunities to remediate threats to an organisation.

"If the cybersecurity skills gap is ever going to shrink, we must start to cast a wider net with developer upskilling and have a positive impact on software safety in the face of crazy demand for secure code."

Also, for those readers wanting a simplified view of the OWASP Top 10, Immersive Labs has developed a 'cheat sheet.' 

Read 1879 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


David Heath

David Heath has had a long and varied career in the IT industry having worked as a Pre-sales Network Engineer (remember Novell NetWare?), General Manager of IT&T for the TV Shopping Network, as a Technical manager in the Biometrics industry, and as a Technical Trainer and Instructional Designer in the industrial control sector. In all aspects, security has been a driving focus. Throughout his career, David has sought to inform and educate people and has done that through his writings and in more formal educational environments.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News