Information Security Research Library

Powered by


For many of those responsible for enterprise information security practices, there is often a traditional yet amorphous boundary preventing full engagement in application security. It’s a disconnect that not only inhibits security pros from influencing the application development process, but it also makes it difficult for application security vulnerabilities to be identified and addressed promptly.

One of the interesting conundrums presented by this disconnect is that the infosec team is often responsible for assessing and triaging all vulnerabilities, regardless of origin. Yet without the authority or means to correct application-layer vulnerabilities, root cause remediation is near impossible.

Key points of emphasis include how to overcome the “Application Security Divide,” how infrastructure security teams can prevent exploitation of application-layer vulnerabilities and dependencies owned by infrastructure and “disconnected” infosec teams that can strengthen application security.


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.