(Source: Infosecurity Magazine) In today’s complex, technology-dependent enterprises, the answer to “Why?” is straightforward. Enterprises cannot expect a collection of independent activities—a pen test here, an hour of training there, some free tools that may not work as advertised to consistently result in secure software. Enterprises train, buy some …