By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
As a rule, complexity is the enemy of security. When more applications are introduced, the number of attack vectors increases, making the application infrastructure as a whole more difficult to secure. If, for example, your organization plans on supporting the Google Chrome browser, you now need to stay current with attacks against Firefox, Internet Explorer, Chrome and all the plug-ins that may possibly be installed in them.
If politically your organization has already made the commitment to multiple browsers, make sure that you have some mechanism or procedure to stay up to date on the risk vectors of all of your third-party applications, not just browsers.
Dig Deeper on Web Browser Security
Related Q&A from John Strand
Expert John Strand explains how to shore up security as you plan a large-scale advertising campaign.continue reading
Expert John Strand reviews how to spot input validation flaws on your websites.continue reading
Expert John Strand reveals two exciting trends in antivirus software.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.