A security analyst has discovered that a web application is vulnerable to SQL injection attacks. Which control should the analyst recommend implementing to mitigate this vulnerability?
Enforce strong password policies
Enable detailed logging
Regularly update the web server software
Implement parameterized queries