tag:blogger.com,1999:blog-13756280.post115699796438174005..comments2024-02-08T03:44:23.780-08:00Comments on Jeremiah Grossman: Where the Web Application Security Market is HeadingJeremiah Grossmanhttp://www.blogger.com/profile/05017778127841311186noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-13756280.post-1157156916638907912006-09-01T17:28:00.000-07:002006-09-01T17:28:00.000-07:00It seems like the authors of the article are signi...It seems like the authors of the article are significantly overestimating the efficacy of automated scanning tools. Whether you're doing static analysis, pen-testing or whatever, I question the capacity of any automated tool to do even an adequate vulnerability analysis. Based on personal experience with one of these "high end" vulnerability scanners, they are only as good as the person using them; even the most expensive solutions will be virtually useless in the hands of someone who is not well versed in security themselves.Anonymousnoreply@blogger.com