Nov 01, 2011 05:00 EDT
Age-old vulnerabilities, like SQL injection and cross-site scripting, remain prevalent in applications. And that trend will continue, unless there is a fundamental shift in how programs are developed and secured.. To secure web applications, makers must take ownership of their lifecycle management, reports Deb Radcliff.
Feb 01, 2010 07:18 EST
Considering the economic climate, 2009 was not terribly gloomy for the IT security space, and 2010 looks even better, reports Dan Kaplan.. h1Considering the economic climate, 2009 was not terribly gloomy for the IT security space, and 2010 looks even better, reports Dan Kaplan./h1 pNo single market can claim immunity from the global financial meltdown that has crippled the United States in a way not seen since the Great Depression./p pBut there are exceptions to rules ? at least partial ones ? and few would dispute that given the sophisticated threat landscape and ongoing compliance demands, IT security is being seen as a business essential./p pSome 15 months removed from the Lehman Bros. collapse, which marked the largest bankruptcy filing in U.S. history and sparked a domino effect of economic calamity not seen in generations, the IT security industry pulled through relatively unscathed, according to experts. In some verticals, the space actually has flourished. So, it is no wonder t