Next to social engineering the number one targets for hackers are the applications. Complex components, each with their own unique configurations and patches, all being poked for holes. Application's are the gateway to the data and yet as an industry application security is still far behind in the list of priorities.

This episode goes into application security, development cycles and continual scans and reviews of your critical applications. Deploy and forget is no longer an acceptable practice.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com