Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

4 key elements for proactive application security

George Viegas | Jan. 6, 2014
We most often hear of the security breaches due to cross site scripting and SQL injection attacks, after the related vulnerabilities have been successfully exploited. But what could we do to prevent such attacks occurring in the first place?

Effective proactive security requires code scanning to be as unobtrusive into the application development cycle as possible. The more the security scan can work like an existing development process, the better the chance of successful adoption and continuous use by the development teams.


Previous Page  1  2  3 

Sign up for Computerworld eNewsletters.