The foundational principle of defense in depth says no single security layer is impenetrable: never trust any layer, always use multiple layers, always assume you are already breached and are trying to prove otherwise. Security scanners are security layers. No two scanners align 100% of the time. That's not a bug; that's why you should always use more than one.But what happens when you try to correlate findings across tools? Some security vendors actively make this harder than it needs to be, and not by accident. And when vendors choose to compete as a design choice for security? That is what tells you whose interests the vendor is really protecting.
In this webinar, we’ll cover:
Speakers
Tracy Walker
Principal Solutions Engineer
DefectDojo