Welcome to the Application Security Community of Practice. Our mission is to openly share resources and expertise in the domain of application security in order to enhance the overall knowledge and capabilities of the community.
Tag your tweets #ibmsecurity | Take me to videos and pictures tagged #ibmsecurityl
The Right Tool for the Right Job
Darrel Rader 270002AASK Tags:  whitepaper security app-security-cop appsec application-security 1,465 Visits
During the 1980s, war dialing and phone phreaking attacksgarnered all the headlines. In the 1990s, it was all about Webdefacement and the ubiquitous e-mail virus. The last sevenyears have given rise to identity data theft and privacy con-cerns. For the past 20 years, organizations focused on protect-ing the network, but in the last 10 years, it has become clearthat the core threat is access to the network. The network isjust a means to an end. The threat has always been access tothe private data and the applications or business functions thatinteract with data. Private data and business applications aresusceptible to attacks and the most vulnerable during an attackto the enterprise network.
Here is the URL for this bookmark: ftp://public.dhe.ibm.com/common/ssi/sa/wh/n/raw14201usen/RAW14201USEN.PDF