A security analyst has discovered that a web application is vulnerable to SQL injection attacks. Which control should the analyst recommend implementing to mitigate this vulnerability?
Implement parameterized queries
Regularly update the web server software
Enable detailed logging
Enforce strong password policies