(Source: GCN.com) So far, attempts at security have been based on securing the network, … However, these approaches to security still leave the software at the very core of the …