Applications - the weakest link?

Wednesday, 29 October 2003, 2:16 PM EST

While companies are still grappling with which firewall to buy and whether intrusion detection systems are worth the trouble they put the administration through, security professionals are putting the spotlight on another part of the IT enterprise.

"Applications are key weaknesses in the security chain," explained Christopher Lim, associate, Technology & Security Risk Services, Ernst & Young, Singapore. "And most applications are developed without taking security into consideration. With web services being the next big thing, the risks is severe if security is not properly addressed for applications based on web services."

To nip this problem in the bud, Ernst and Young Labs for Internet and Security (EYLIS) partnered with Microsoft to establish a practice to provide assurance on the integrity of application systems. A result of this partnership is the Secure Development lab session came out jointly by EYLIS and Microsoft Singapore to provide training to organisations.

The Secure Development lab session teaches the fundamental development principles in creating secure applications based on Microsoft technologies using ASP and ASP.Net.

[ Read more ]

Related items




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //