Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
Scroll to Explore
banner

Key Application Security Questions for IT Organizations

Get Started

screen-with-code.jpg

It's time we give application security the attention it requires. All IT organizations need to address application security. It doesn't matter if you develop applications in-house or buy third party-developed applications.

According to the Ponemon Institute's recent Application Security in the Changing Risk Landscape report:

  1. The frequency and severity of application layer attacks is greater than network layer attacks.
  2. Network security is better funded than application security.

 

This may sound backward, and it is! The investment in network security heavily outweighs application security.

Here are the key application security questions IT organizations should consider:

  1. Are you centrally patching all third party applications on a routine basis? Commonly targeted applications (e.g. Adobe Reader, Java Runtime, Firefox, etc.) are most critical to update and can give the attacker a backdoor into your network.
  2. Do you routinely test your applications (e.g. mobile apps, web apps) for security flaws? Keep in mind, applications change over time, and periodic testing should be performed.
  3. For third party-developed applications, do you evaluate the security practices of the software providers? Not all vendors treat your data with the same level of security. You need a repeatable process to evaluate the security posture of software vendors and other third parties that present a risk to your organization.
  4. If you develop software in-house, do you utilize secure development practices in all phases of the software development life cycle? Do you train developers on secure coding practices?
  5. Are application logs retained for a reasonable period of time and protected from tampering?
  6. Does your information security team have application security expertise? If not, can you partner with a security provider that can provide this expertise?

What application security challenges does your organization face?