Applications: The weakest link?

    Date28 Oct 2003
    3689
    Posted ByAnthony Pell
    While companies are still grappling with which firewall to buy and whether intrusion detection systems are worth the trouble they put the administration through, security professionals are putting the spotlight on another part of the IT enterprise. "Applications are key weaknesses . . . While companies are still grappling with which firewall to buy and whether intrusion detection systems are worth the trouble they put the administration through, security professionals are putting the spotlight on another part of the IT enterprise. "Applications are key weaknesses in the security chain," explained Christopher Lim, associate, Technology & Security Risk Services, Ernst & Young, Singapore. "And most applications are developed without taking security into consideration. With web services being the next big thing, the risks is severe if security is not properly addressed for applications based on web services."

    To nip this problem in the bud, Ernst and Young Labs for Internet and Security (EYLIS) partnered with Microsoft to establish a practice to provide assurance on the integrity of application systems. A result of this partnership is the Secure Development lab session came out jointly by EYLIS and Microsoft Singapore to provide training to organisations.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"5","type":"x","order":"1","pct":83.33,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.