"Only one vulnerable code component in an application can open the door for a massive security breach," Chestna suggests. "So trying to keep a very carefully preserved inventory from the code components your software relies on, combined with Regular testing, would be the best way to circumvent a hacker from http://applicationsecurity71235.dbblog.net/25157637/detailed-notes-on-software-security-best-practices