How to Overcome The Top 6 Application Security Challenges

By : Krishna Anindyo | Saturday, June 13 2020 - 13:00 IWST

Ilustration Security Challenges (Photo by Information Age)
Ilustration Security Challenges (Photo by Information Age)

INDUSTRY.co.id - Most companies take a reactive approach to application security and information security. But why wait for an attacker to get into your unprotected (or minimally protected) sensitive data before you decide to do something about it?

What application security challenges are you facing?

When security becomes a problem, it becomes a crisis. Getting ahead of the crisis potential with a proactive security approach allows you to reclaim your staff and reinvest your time and activities to further your company’s goals and industry reputation. If you wait until it’s too late, all attention will focus on remediation efforts and damage control as you attempt to hold onto what little trust still remains within your customer base. A more logical approach is to get ahead of the bad guys.

There are six primary challenges that organisations face as they move toward a proactive security approach.

1. Hiring and retaining security experts is difficult and costly.

The shortage of available talent for cyber security positions has caused their salaries to skyrocket. In 2018, information security analyst salaries averaged US$98,350, and the top 25% made nearly US$127,000. Add the cost of benefits and overhead (about 43% of wages and salary in the private sector), and you’re looking at a major investment for a very specific skill set.

2. Your legacy or third-party applications might carry security risks.

Hackers look for the easiest way into your organisation. Unfortunately, your limited internal resources might not have the time, skills, or tools to identify all the paths hackers have access to, even if you’ve been testing your applications regularly. Attackers also like to exploit vulnerabilities in legacy code. When your developers reuse code that has been in circulation for decades, they may unwittingly inherit its technical debt, which includes security bugs and flaws.

3. Lumpy demand requires elastic capacity.

Most companies no longer follow a fixed-release schedule. Instead, continuous integration and continuous delivery (CI/CD) has essentially become mandatory for organisations to stay competitive and meet customer demands. And each of these continual feature releases carries a different level of technical risk and business impact, which an application security program must be able to accommodate.

4. You need to respond to changes on a dime.

Not only are you dealing with a lumpy release schedule, but your business is also evolving quickly. Your security team needs to keep pace. If demand spikes without your having a full application security team on hand, you’ll be scrambling to test and clean up code — or worse, to deploy patches to software that’s already in the hands of users.

5. No single testing tool can catch every vulnerability.

Every security testing tool has different strengths, and no tool catches everything. If budget and resource limits restrict you to using only one or two security testing tools, you might miss critical vulnerabilities. What’s more, without the capacity to replicate and confirm findings, you might spend countless hours chasing false positives.

6. Tools alone are not enough to keep you safe.

Application security changes constantly. New threats and attack vectors emerge, and new regulations ramp up compliance requirements. Your testing and prevention strategies need to keep up with those changes.

News Comment

Today's Industry

Friedhelm Best - Vice President Asia Pacific, HIMA (Photo by HIMA)

Jumat, 23 Oktober 2020 - 14:30 WIB

Farm & Food 4.0: How Technology Is Transforming an Industry

Digitization has affected different industries, and especially now, the food and farming industries as well.

Rena Chua, Bug Bounty Advisor at HackerOne (Photo by Linkedin)

Jumat, 23 Oktober 2020 - 11:35 WIB

3 Key Problems Security Professionals Have With Traditional Penetration Testing

Based on customer interviews, the study identifies 3 key problems with traditional pentesting solutions and evaluates the benefits of time-bound testing using ethical hackers.

The Pacific Asia Travel Association (PATA)

Jumat, 23 Oktober 2020 - 11:20 WIB

PATA Embarks On Governance Reorganisation

The Pacific Asia Travel Association (PATA) has taken the bold move to make significant changes to the design of its organisational governance at the recent Board Meeting and Annual General Meeting…

Yaffa Finkelstein - Product Marketing Manager, Check Point Software Technologies (Photo by Linkedin)

Kamis, 22 Oktober 2020 - 10:35 WIB

Secure Your Containers Like Your Apps Depend On It

Today we’ll share some of the container security concerns which you might not have considered until now, and we’ll explain how to mitigate those risks, without imposing on your agile DevOps…

Friedhelm Best - Vice President Asia Pacific, HIMA (Photo by HIMA)

Rabu, 21 Oktober 2020 - 14:20 WIB

Pharma 4.0: How Technology Is Transforming an Industry

Digital advancements in areas like systems integration, track-and-trace technology, and deep learning are helping the industry optimize its supply chain, improve safety, and even develop new…