Front-line programmers default to insecure practices unless they are instructed to do otherwise
By CORY DOCTOROW
It's always sort of baffling when security breaches reveal that a company has stored millions of users' passwords in unencrypted form, or put their data on an insecure cloud drive, or transmitted it between the users' devices and the company's servers without encryption, or left an API wide open, or some other elementary error: how does anyone in this day and age deploy something so insecure?
Programmers are given far to little time to properly develop code. The result: shortcuts are taken. Deadlines imposed by management is the greatest cause of bugs and security breaches.
Don't stop where the ink does.
CC BY-SA 4.0
CC BY-SA 4.0
Comments
Post a Comment