{"id":200,"date":"2011-07-19T01:19:00","date_gmt":"2011-07-19T01:19:00","guid":{"rendered":"https:\/\/belayclientstaging.zone\/securityeverafter\/2011\/07\/19\/control-7-application-software-security\/"},"modified":"2011-07-19T01:19:00","modified_gmt":"2011-07-19T01:19:00","slug":"control-7-application-software-security","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/control-7-application-software-security\/","title":{"rendered":"Control 7: Application Software Security"},"content":{"rendered":"

Attacks against applications are certainly a growing threat to organizations. Some argue that as system administrators are much better at configuring and patching their systems, the application is the next logical target of attack. What can be done at little to no cost to help prevent these threats to your environment? Glad you asked.<\/p>\n