Application Security , Next-Generation Technologies & Secure Development

Addressing Application Security Vulnerabilities

Alex Mosher of CA Technologies Discusses Breach Prevention Strategies
Alex Mosher, vice president of security strategy, CA Technologies

Many recent data breaches, including the Equifax incident, show that "applications are really the vulnerable entry point into organizations and ultimately to organizations' data," says Alex Mosher, vice president of security strategy at CA Technologies.

See Also: Webinar | The Future of Adaptive Authentication in Financial Services

"It's too difficult today to breach traditional firewalls and infrastructure security, and much easier for hackers to exploit vulnerabilities in applications,' he contends.

In a video interview at Information Security Media Group's recent Fraud and Breach Prevention Summit in Toronto, Mosher also discusses:

  • Why developers must code new applications with security in mind;
  • The correlation between weak credentials and application vulnerabilities;
  • Legacy application security.

Mosher is responsible for CA's cybersecurity strategy and go-to-market plan and execution. He joined CA in 2007. As a 20-year information technology industry veteran, he has hands-on experience in sales and marketing, development and deployment services.


About the Author

Marianne Kolbasuk McGee

Marianne Kolbasuk McGee

Executive Editor, HealthcareInfoSecurity

McGee is executive editor of Information Security Media Group's HealthcareInfoSecurity.com media site. She has about 30 years of IT journalism experience, with a focus on healthcare information technology issues for more than 15 years. Before joining ISMG in 2012, she was a reporter at InformationWeek magazine and news site, and played a lead role in the launch of InformationWeek's healthcare IT media site.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.