
Sign up to save your podcasts
Or
BLACK HAT SERIES 2014
IBM's Security Systems X-Force recommends that a shift takes place from focusing on protecting the perimeter to securing applications.
The X-Force publishes a Threat Quarterly Report that analyzes security breaches and methods used by the bad guys. Based on over one million data points, the report found that Java, SQL injections, cross-site scripting and authentication problems remain challenges for developers and recommends they adopt Secure Lifecycle Development to reduce system vulnerabilities.
At Black Hat in Las Vegas, securitycurrent's Vic Wheatman spoke with Michael Hamelin, the Lead X-Force Security Architect on today's most prevalent forms of attack and what should be done.
BLACK HAT SERIES 2014
IBM's Security Systems X-Force recommends that a shift takes place from focusing on protecting the perimeter to securing applications.
The X-Force publishes a Threat Quarterly Report that analyzes security breaches and methods used by the bad guys. Based on over one million data points, the report found that Java, SQL injections, cross-site scripting and authentication problems remain challenges for developers and recommends they adopt Secure Lifecycle Development to reduce system vulnerabilities.
At Black Hat in Las Vegas, securitycurrent's Vic Wheatman spoke with Michael Hamelin, the Lead X-Force Security Architect on today's most prevalent forms of attack and what should be done.