Ken's Security Audits
Most security vulnerabilities are at the
application and Web layer (yes, where
your precious code is written ). Even a
state-of-the-art firewall is not sufficient.
For instance, some of the most popular
attacks are script based attacks XSS and
CSRF. In the application layer, the business
logic and UI is ever evolving, raising new
concerns and threats. Also, IT is equipped
to handle issues at a network and
server level.
Application security has a deep relation
with the services they offer, logic, work
flow and user interfaces or web services.
Scrutiny at a code level is required to
ensure there are no weak links. We can
help you with such audits.