{"id":3653,"date":"2016-10-12T09:23:49","date_gmt":"2016-10-12T13:23:49","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3653"},"modified":"2016-10-12T09:23:49","modified_gmt":"2016-10-12T13:23:49","slug":"businesses-sacrifice-security-to-get-apps-released-faster","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/12\/businesses-sacrifice-security-to-get-apps-released-faster\/","title":{"rendered":"\u201cBusinesses Sacrifice Security to Get Apps Released Faster\u201d"},"content":{"rendered":"<p>Recently, many organizations that struggled to deliver strong protection under the pressure of the app economy, decided to compromise on security to get apps released faster. This would be a great risk to both companies and their customers or app users. Since the app economy is bringing new cyber security challenges, companies should increase the complexity of their security practice to better protect customer\u2019s information against attacks, instead of cutting corners. Customers also expect rapid and secure experiences. If they think that app is not secure, they would switch to an alternative app immediately. One way the article mentioned to respond to the new challenges of app economy is identity-centric security. The identity-centric approach uses behavioral analytics and predictive strategies to verify identities and mange identity-related activities without sacrificing the customer experience. In addition, the security team must work together with app development team in every phase of the development process to ensure security is integrated into the app.<\/p>\n<p>Security is usually the greatest concern on e-commerce and e-banking. Even though the company is under intense pressure due to fierce competition in the market and the rising demand of customers. It is obviously not a wise decision to compromise on security for faster release. This compromise will cause serious risks to the company. The app will be vulnerable to hacking or malicious attacks, and hackers may steal customers\u2019 information or credentials for financial purpose or illegal use. Therefore, the company may involve into litigations. Their reputation may be damaged and customers will switch to other apps since there are so many similar apps available in the market. The risk of loss outweighs the benefit of faster release.<\/p>\n<p>&nbsp;<\/p>\n<p>Link: <a href=\"http:\/\/www.darkreading.com\/application-security\/businesses-sacrifice-security-to-get-apps-released-faster\/d\/d-id\/1327151\">http:\/\/www.darkreading.com\/application-security\/businesses-sacrifice-security-to-get-apps-released-faster\/d\/d-id\/1327151<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, many organizations that struggled to deliver strong protection under the pressure of the app economy, decided to compromise on security to get apps released faster. This would be a great risk to both companies and their customers or app users. Since the app economy is bringing new cyber security challenges, companies should increase the [&hellip;]<\/p>\n","protected":false},"author":11323,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[716352],"tags":[],"class_list":{"0":"post-3653","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-07-policy-documents-video","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11323"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3653"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3653\/revisions"}],"predecessor-version":[{"id":3654,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3653\/revisions\/3654"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}