{"id":9887,"date":"2017-10-31T10:51:51","date_gmt":"2017-10-31T15:51:51","guid":{"rendered":"http:\/\/www.mrc-productivity.com\/blog\/?p=9887"},"modified":"2022-11-22T16:04:45","modified_gmt":"2022-11-22T22:04:45","slug":"webinar-replay-application-security-mistakes-you-cant-afford-to-make","status":"publish","type":"post","link":"https:\/\/www.mrc-productivity.com\/blog\/2017\/10\/webinar-replay-application-security-mistakes-you-cant-afford-to-make\/","title":{"rendered":"Webinar Replay: Application security mistakes you can&#8217;t afford to make"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-725\" alt=\"Education\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2010\/11\/Education.jpg\" width=\"76\" height=\"100\" \/><em><span style=\"font-size: 14px;\">Summary: As cyber-attacks increase and become more sophisticated, application security should be a top priority. Yet, businesses still struggle in this area. They are not only still developing\u00a0applications with poor security, they\u2019re building applications with widely-known vulnerabilities.\u00a0This webinar replay will help you learn problems that lead to vulnerable applications, and security mistakes you can&#8217;t afford to make.<\/span><\/em><br \/>\n<a name=\"20160119\"><\/a><!--more--><br \/>\n<figure id=\"attachment_9493\" aria-describedby=\"caption-attachment-9493\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/09\/hack-813290_640-300x168.jpg\" alt=\"photo credit: JavadR via pixabay cc\" width=\"300\" height=\"168\" class=\"size-medium wp-image-9493\" srcset=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/09\/hack-813290_640-300x168.jpg 300w, https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/09\/hack-813290_640.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-9493\" class=\"wp-caption-text\">photo credit: <a href=\"https:\/\/pixabay.com\/en\/hack-hacker-elite-hacking-exploits-813290\/\">JavadR<\/a> via <a href=\"http:\/\/pixabay.com\/\">pixabay<\/a> <a href=\"http:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">cc<\/a><\/figcaption><\/figure><\/p>\n<p>Let me ask you a question: Which aspect of your business systems do you think hackers target the most? As mentioned in this <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'dark reading']); \" href=\"http:\/\/www.darkreading.com\/risk-management\/6-ways-to-strengthen-web-app-security\/d\/d-id\/1106197\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">article<\/span><\/a>: \u201cAccording to numerous studies, the preferred method for attacking businesses&#8217; online assets is via their Web applications.\u201d<\/p>\n<p>Why do hackers target web apps? Because they are commonly built with known vulnerabilities&#8211;giving attackers an easy way into a business.<\/p>\n<p>A recent <span style=\"color: red;font-weight: bold\">report<\/span> found that 86 percent of web applications tested had serious issues with authentication, access control, and confidentiality. What\u2019s worse, 52% of web applications suffered from commonly-known vulnerabilities, like Cross-Site Scripting, SQL Injection, and others.<\/p>\n<p>These findings are downright scary. Businesses aren\u2019t even protecting their applications against the most common threats. For a decade now, threats like Cross-Site Scripting and SQL Injection have taken the top spots in the <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'OWASP Top Ten list']); \" href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">OWASP Top Ten list<\/span><\/a>&#8211;a listing of the most critical web app security flaws. What\u2019s more, they\u2019re not that hard to fix. <\/p>\n<p><strong>Consider those facts<\/strong>: Most business web applications suffer from widely known, yet preventable security vulnerabilities. They are not new threats&#8211;being listed as a top security threat for over 10 years running. These threats can cause irreparable damage to a business. <\/p>\n<p>Why does this keep happening year after year? Why do businesses keep creating applications containing known (and dangerous) vulnerabilities? How can your business address these issues?<\/p>\n<p>We recently held a webinar on the <span style=\"color: red;font-weight: bold\">web application security risks you can\u2019t afford to make<\/span>. In this webinar replay, you will learn how to:<\/p>\n<ul class=\"arrow-list colored\">\n<li>Common problems that lead to vulnerable applications<\/li>\n<li>The most important security mistakes you can\u2019t afford to make<\/li>\n<li>Ways to address critical security risks in your applications<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Summary: As cyber-attacks increase and become more sophisticated, application security should be a top priority. Yet, businesses still struggle in this area. They are not only still developing\u00a0applications with poor security, they\u2019re building applications with widely-known vulnerabilities.\u00a0This webinar replay will help you learn problems that lead to vulnerable applications, and security mistakes you can&#8217;t afford &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.mrc-productivity.com\/blog\/2017\/10\/webinar-replay-application-security-mistakes-you-cant-afford-to-make\/\"> <span class=\"screen-reader-text\">Webinar Replay: Application security mistakes you can&#8217;t afford to make<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","slim_seo":{"title":"Webinar Replay: Application security mistakes you can't afford to make - mrc&#039;s Cup of Joe Blog","description":"Summary: As cyber-attacks increase and become more sophisticated, application security should be a top priority. Yet, businesses still struggle in this area. Th"},"footnotes":""},"categories":[8],"tags":[71,98],"class_list":["post-9887","post","type-post","status-publish","format-standard","hentry","category-education","tag-security","tag-webinar"],"_links":{"self":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/9887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/comments?post=9887"}],"version-history":[{"count":8,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/9887\/revisions"}],"predecessor-version":[{"id":14157,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/9887\/revisions\/14157"}],"wp:attachment":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/media?parent=9887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/categories?post=9887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/tags?post=9887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}