{"id":10436,"date":"2017-06-26T13:30:01","date_gmt":"2017-06-26T18:30:01","guid":{"rendered":"http:\/\/www.mrc-productivity.com\/blog\/?p=10436"},"modified":"2021-10-14T11:29:49","modified_gmt":"2021-10-14T16:29:49","slug":"solving-the-top-10-application-security-threats-2","status":"publish","type":"post","link":"https:\/\/www.mrc-productivity.com\/blog\/2017\/06\/solving-the-top-10-application-security-threats-2\/","title":{"rendered":"Solving the Top 10 Application Security Threats"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-725\" alt=\"Education\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2010\/11\/Education.jpg\" width=\"76\" height=\"100\" \/><span style=\"font-size: 14px;\"><em>Summary: Cyberattacks are increasing. Attacks are more sophisticated and frequent than ever. Yet, application security still lags behind. Through poor security practices, businesses unwittingly expose themselves to reputation damage and massive revenue loss. Why is security still such a big problem, and how can you address it? This free paper will help you answer both questions. <\/em><\/span><br \/>\n<a name=\"20160802\"><\/a><!--more--><br \/>\nWeb application attackers are becoming more sophisticated. But, application security isn\u2019t keeping pace. Poor application security is becoming an epidemic. How bad is it? One report found that <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Outside Link', 'info-point']); \" href=\"https:\/\/www.info-point-security.com\/sites\/default\/files\/cenzic-vulnerability-report-2014.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">96% of all web applications<\/span><\/a> contain at least one \u201cserious vulnerability.\u201d<\/p>\n<p>Why? Why do businesses create vulnerable applications year after year? Here are a few common reasons: <\/p>\n<ul class=\"arrow-list colored\">\n<li><strong>No incentives for security<\/strong>: Peter Drucker is famously quoted as saying, \u201cWhat is measured improves.\u201d The problem for many developers: Security isn\u2019t measured. Rather, they get rewarded for features and development speed&#8230;not security. <\/li>\n<li><strong>New developers in the workforce<\/strong>: New developers are constantly entering the workforce. They\u2019re stuck maintaining code they didn\u2019t develop, and don\u2019t always understand what a weakness looks like. These new developers make the same security mistakes as their predecessor.<\/li>\n<li><strong>Short deadlines harm security<\/strong>: As businesses place greater importance on application development speed, security suffers. Developers rush through the project\u2014ensuring it meets all the business requirements. But, this often comes at the expense of proper security practices.<\/li>\n<li><strong>Businesses treat security like a feature<\/strong>: Shortly after the healthcare.gov site went live, a \u201cwhite hat\u201d hacker testified on Capitol Hill that <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Outside Link', 'healthcare-gov-security']); \" href=\"http:\/\/www.cnbc.com\/id\/101225308\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">security was never properly built into the site<\/span><\/a>. Many businesses struggle with this same problem. They treat security like any other feature that they can add to an application. The problem: Security isn\u2019t something a developer can add at the end. You must build security into the application.<\/li>\n<\/ul>\n<p>If you think about it, developers are placed in a no-win situation. They\u2019re tasked with developing modern applications. They must keep up with ever-evolving application trends. They&#8217;re faced with tight deadlines. Unless the business can afford a dedicated security engineer, the developer is in charge of security as well. <\/p>\n<p><strong>How can they keep up to date with modern development methods and security risks, while meeting tight deadlines? In many cases, they can\u2019t.<\/strong><\/p>\n<p>So, how can your business create applications that address the top security risks&#8230;without sacrificing development speed? We\u2019ve created a new paper that answers this very question, which you can find right here: <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'Security Paper']); \" href=\"https:\/\/www.mrc-productivity.com\/research\/solving-application-security.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Solving the Top 10 Application Security Threats<\/span><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: Cyberattacks are increasing. Attacks are more sophisticated and frequent than ever. Yet, application security still lags behind. Through poor security practices, businesses unwittingly expose themselves to reputation damage and massive revenue loss. Why is security still such a big problem, and how can you address it? This free paper will help you answer both &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.mrc-productivity.com\/blog\/2017\/06\/solving-the-top-10-application-security-threats-2\/\"> <span class=\"screen-reader-text\">Solving the Top 10 Application Security Threats<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","slim_seo":{"title":"Solving the Top 10 Application Security Threats - mrc&#039;s Cup of Joe Blog","description":"Summary: Cyberattacks are increasing. Attacks are more sophisticated and frequent than ever. Yet, application security still lags behind. Through poor security"},"footnotes":""},"categories":[8],"tags":[71],"class_list":["post-10436","post","type-post","status-publish","format-standard","hentry","category-education","tag-security"],"_links":{"self":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/10436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/comments?post=10436"}],"version-history":[{"count":5,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/10436\/revisions"}],"predecessor-version":[{"id":13140,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/10436\/revisions\/13140"}],"wp:attachment":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/media?parent=10436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/categories?post=10436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/tags?post=10436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}