Vandana Verma

Security Leader

OWASP Dependency Check

Introduction to the Project.To understand what is. Dependency Checker by Supported Languages/tech. Relation to OWASP top 10. Reviewing How it works. Vulnerability Data Source and Evidence based identification, issues and Remediation. How to use Dependency Check Components of Dependency Check. Use Cases of Dependency Check. Enterprise Deployments. How to read the reports.