Protection from the Inside: Application Security Methodologies Compared

by Jacob Williams
Sept. 1, 2017 0 comments SANS Institute application and database security

Web applications are a common source of compromise and the vector attackers often use to penetrate a network. They are often complex and developed by those with little understanding of security in software development. Fundamental misunderstandings of security by those responsible for custom code development in our environments too often lead to compromises, with disastrous results.

https://www.sans.org/reading-room/whitepapers/analyst/protection-inside-application-security-meth...