
Mastering Web Security: Myths, Strategies & More! • Scott Helme & Sebastian Brandes
GOTO - The Brightest Minds in Tech
Security Challenges with Legacy Applications and Shadow IT
The chapter delves into the risks associated with neglecting legacy applications and shadow IT, stressing the importance of addressing security vulnerabilities in these overlooked areas. It emphasizes the significance of setting secure cookie attributes, conducting thorough infrastructure scans, and staying up-to-date with evolving security measures to combat potential threats. The conversation also discusses the limitations of legacy security testing providers, the importance of smart testing, and the necessity of implementing a defense-in-depth strategy in web security.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.