Explain why addressing middleware security issues are complex and expensive. 

What would you consider to be middleware? Identify some middleware applications and practical uses.