Tag Archives: Application Security

Security Manager’s Journal: Taking steps to better lock down the network

Our manager decides that, like users, resources on the network should adhere to the rule of least privilege. The resources on our network have been given too much access to the Internet, and we need to curb that. At issue: … Continue reading

Posted in Tech | Tagged , , , , , | Leave a comment

5 steps for application security

The software development lifecycle can be a double-edged sword. On one hand, software needs to be developed with usability in mind, and it needs to be produced quickly. On the other hand, it also needs to maintain a solid security … Continue reading

Posted in Tech | Tagged , , , | Comments Off