Get your act together, ictQatar official tells local web developers

February 20, 2012 - 10:52:17 pm

By CHRIS V PANGANIBAN

DOHA: Local web developers need to get their acts together with a dynamic collaboration through the social networks like Facebook and Twitter to address prevailing issues on vulnerability to online threats.

Dana Al Abdulla, Cyber Security Resiliency Manager of ictQatar’s QCERT, made this call during the launch yesterday of the Open Web Application Security Project (OWASP) –Qatar Chapter during a meeting at Qatar University.

Al Abdullah said the creation of OWASP in Qatar would help aspiring developers of web applications become more equipped in confronting latest vulnerabilities to cyberspace that it is imperative to establish their own community to share knowledge and skills.

She cited OWASP as a global non-profit organisation focused on improving security of application software with a mission to make such application security visible so that people and organisations can make informed decisions about true application security risks.

OWASP Qatar Chapter was organised to raise awareness about application security and build a community for application developers in Qatar to learn, discuss and share their expertise in making applications more secure.

Participants from the academia and IT staff from private and government sectors were briefed yesterday by Justin Searle, Managing Partner of global cyber security services provider UtiliSec, about the top 10 vulnerabilities in developing web applications.

“The top 10 vulnerabilities developed by Internet hackers are going beyond web applications security,” Searle warned in his presentation “A Deep Dive into OWASP Top Ten Vulnerabilities.”

Khalid Al Hashmi, Cyber Security Executive Director at ictQatar, underscored the importance of organising the local web developers’ community because there is a need for them to fully understand cyber security since every single device that they use has always application.

“Hackers go to these applications if they find it weak which will eventually lead to a compromised infrastructure,” Al Hashmi said. He recalled based on his wide experience that developers years ago always wanted to capture the threats but they have always confronted with obstacles from security and their document. The Peninsula

COMMENTS

comments powered by Disqus