From Inception to TestingFor years it seems the IT industry has focused on security as a level of the network, the operating system or the user end point. And while there are still a great many truly pernicious threats targeting the user today, application vulnerabilities are becoming increasingly exploited-the recent Twitter cross-site scripting worm being a perfect example. Listen to the Podcast |