application security 2 discussions 1

1) Fileless Malware:

Introduce and discuss a relevant issue regarding Fileless Malware.

Please find peer-reviewed journals to write the discussion. – please utilize scholarly works instead of popular sources for references as required.

2) Security Policy Conformance

– Introduce and discuss a relevant issue regarding Security Policy Conformance.

– include at least 2 scholarly references in APA format.