<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Life &#187; Application Security</title>
	<atom:link href="https://www.informationlife.net/tag/application-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.informationlife.net</link>
	<description>The latest Information Lifecycle Management (ILM) updates</description>
	<lastBuildDate>Wed, 30 Mar 2016 11:17:49 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.17</generator>
	<item>
		<title>How to Improve Your Application Security Practices</title>
		<link>https://www.informationlife.net/how-improve-your-application-security-practices/</link>
		<comments>https://www.informationlife.net/how-improve-your-application-security-practices/#comments</comments>
		<pubDate>Tue, 31 Jul 2012 04:38:47 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Data Breach]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=2518</guid>
		<description><![CDATA[<p>Though organizations talk about the importance of having good security measures in place, many still focus the majority of their security resources on the network rather than their applications – the vector for most data breaches.  According to a study by research firm the Ponemon Institute, many organizations dedicate less than 10 percent of their...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/how-improve-your-application-security-practices/">How to Improve Your Application Security Practices</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Though organizations talk about the importance of having good security measures in place, many still focus the majority of their security resources on the network rather than their applications – the vector for most data breaches.  According to a study by research firm the Ponemon Institute, many organizations dedicate less than 10 percent of their IT security budget to application security.</p>
<p>Improving your application security posture requires determining whether you&#8217;re a target of opportunity or a target of choice and understanding your development lifecycle. <a href="http://www.cio.com/article/711879/How_to_Improve_Your_Application_Security_Practices">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/how-improve-your-application-security-practices/">How to Improve Your Application Security Practices</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/how-improve-your-application-security-practices/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
	</channel>
</rss>
