![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7pWt3rdJljZhWstBNtnXJgqSkYZiHuOCSjIg095IrpOr2ntY148VvFvgjxSPCJRMxl5amd_84mS1OvZH_6GHbJ7agA-m5h2K_gPW9kF6MxmWmF85VQuDgBcFAfxJYnMr7a5VIFQ/s320/wh-final.jpg)
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsnJjn_zOC6EZ5vTtl3l9n_NwDxjgv1VctYcVo4yigf-NxADRUVrv5acop6_3SYgZC5l5eCYpXUFZwegpz21Lm1ZqJkIWfox99mGaUmAuy-b9TkJWSPQTuptPEOSNviJNQqpYhOg/s200/wh_logo_new.jpg)
Venture capitalist (Grossman Ventures https://grossman.vc), Internet protector and industry creator. Founded WhiteHat Security & Bit Discovery. BJJ Black Belt.
The answer to your inquiry is as follows.
Using specialized 3rd-party tools that perform thorough analysis of applications to detect vulnerabilities and defects may well meet the intention and objectives of the source code review requirement in PCI Data Security Standard requirement 6.6, if the company using the 3rd-party tool also has the internal expertise to understand the findings and make appropriate changes.
The PCI Security Standards Council will look to clarify this section of the standard during the next revision, to include that testing of web-facing applications can be done via source code review or products that test the application thoroughly for defects and vulnerabilities (when internal staff have the skills to use the tool and fix defects). The PCI Security Standards Council will also consider including prescriptive requirements as to what both the application firewall and application analysis tool or process should test for.
Thank you and regards,
The PCI Security Standards Council Response Team
Here is Dennis's conclusion:
Her testimony was the strongest evidence yet in the state's circumstantial evidence case against the 34-year-old McGuire, who allegedly murdered her husband with a .38 caliber weapon, dismembered his body and placed body parts in three suitcases found in the Chesapeake Bay in May of 2004."
Catch that? "strongest evidence yet in the state's circumstantial evidence case".