| ||
In this chapter, we learned that the best defense for many major web platform vulnerabilities includes keeping up with vendor security patches, disabling unnecessary functionality on the web server, and diligently scanning for the inevitable offender that sneaks past your pre-deployment validation processes. Remember, no application can be secured if it's built on a web platform that's full of security holes.
| ||