Next to social engineering the number one targets for hackers are the applications. Complex components, each with their own unique configurations and patches, all being poked for holes. Application’s are the gateway to the data and yet as an industry application security is still far behind in the list of priorities.
This episode goes into application security, development cycles and continual scans and reviews of your critical applications. Deploy and forget is no longer an acceptable practice.
Be aware, be safe.
————————————
Website – https://binaryblogger.com
Twitter – https://www.twitter.com/binaryblogger
iTunes – https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2
Podcast RSS – http://securityinfive.libsyn.com/rss
YouTube – https://www.youtube.com/binaryblogger
TuneIn Radio – Security In Five Channel
Email – contactme@binaryblogger.com