How is the security of web applications compromised?
Ongoing security breaches have demonstrated how devastating attacks can be when targeting web applications with direct access to sensitive customer and business data. In many cases, decisions were made to purchase and deploy software that did not meet specific security requirements. Considering the potential for severe negative publicity, loss of customers, interruptions to business operations, and settlements with the Federal Trade Commission, the most likely assumption is that these decisions were made without sufficient assessment or knowledge of the software’s security shortcomings.