NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
January 3, 2023

The Path to Improve Your Application Security Posture

Jack Danahy Jack Danahy

“Software is eating the world.”
– Marc Andreessen (Wall Street Journal, 2011)

Application security (AppSec) is the most misunderstood and underserved security challenge facing every organization, security team, and developer. No matter your perspective, the perceived complexity and intractability of the problem space makes it the most likely to be delegated, deprioritized, or simply ignored.

Whether you’re in the process of designing and building your own software or trying to get clarity on the security of your vendor-supplied applications, approaching AppSec discussions with an intentionally proactive and practical mindset. statistics and suggestions to make this effort easier to envision, evangelize, and execute.

The Drivers of Application Security

Organizations focus on cybersecurity domains where they feel the most control. For decades, we’ve seen ongoing incremental investment in endpoint, firewalls, gateways, awareness training, identity and access management (IAM), and secure storage. All are important, and all have made security far better.

In contrast, application security suffers from more frugal treatment because secure practices and policies for applications are outside the purview and experience of most security teams and security-minded business leaders. They have little standing or expertise to address resistance from resource-strapped development teams, scheduling pressure from business units, and unmotivated vendors. Application security is left with little urgency and less focus.

Among developers, secure application development is not taught with the same consistency and priority as performance, reliability, or ease-of-use. A Consequently, applications aren’t being built with the same level of investment in secure coding.

60 Percent

The result is the continuing proliferation of vulnerable software and a growing ecosystem of tools designed to identify, exploit, and co-opt those applications. Just one of these vulnerable applications, if popular enough, can wreak far more havoc than any standalone corporate compromise.

Graph_IllustratorWell-publicized examples include the vulnerabilities discovered in ServiceNow and, more recently, Log4j. Once discovered, such vulnerabilities tend to persist, no matter the severity or public exposure. The average time to fix a critical or high severity vulnerability is still well over six months from time of discovery. During this period, attackers will identify, exploit, and leverage the vulnerability to either launch their campaign or create a resilient backdoor to continue their work after the vulnerability is eventually patched.

We’ve learned that:

  1. Vulnerabilities survive and even thrive in the typical development and software acquisition process.
  2. Once vulnerable applications hit the market, there is a long and painful period while organizations muster the will and the resources to correct, block, or otherwise mitigate the vulnerabilities once discovered.

The costs and challenges of poor application security impact both the software creator and the customer. Among the most vulnerable are organizations that are compelled to run older, custom, or unsupported applications. Progress requires an approach that balances the desire to improve with the reality, disruption, and cost of potential remediations.

Executing on Application Security

Here are four areas to consider as you move to improve your application security posture.

1. Create a Reasonable Scope

The average enterprise is managing more than 400 applications according to the Cloud Security Alliance and others. That means your new AppSec program starts with a lengthy list of potential targets. Attempting to concurrently assess and improve this inventory will quickly prove impossible; any successful assessments will identify errors and exposures for which neither time nor resources have been allocated to repair.

You’ll want to establish a meaningful set of criteria to specify your initial targets. Criteria can be risk level, support of the application owner, or public versus private exposure. Select applications that help you tell your story, whether through successful outcomes, defects detected and repaired, or costs and exploits avoided.

2. Rationalize Your Remediation Options

Before beginning your first assessment, consider what actions you’ll take after vulnerabilities are identified, because you will find some. Best-case scenario, a willing vendor will quickly address your findings. Sadly, even that excellent level of support requires weeks or months to materialize. Plan on promptly mitigating risks with additional controls or by limiting access to the application. Notify stakeholders that rely on the application or its outputs. Recognize that some applications may be unsupported or were written by vendors or employees that are no longer around.

An application with an identified but unaddressed weakness is a liability.

Avoid the temptation to point out problems without participating in a plan to address them. This single lesson is key to cultivating a positive and supportive application security program and stakeholder team.

3. Look to the Future

While your existing application inventory is substantial, it’s also growing all the time. Use contract language, preferred vendors, and documented practices to ensure that identified risks don’t continue to expand. During discussions with internal teams and negotiations with vendors, clarify your need to understand and improve the security of applications you will be acquiring. These discussions are best held prior to purchase or the extension or renewal of a software contract. Application providers are most likely to react in line with your security expectations if you’ve made those expectations clear from the start.

Beyond transparency, do your due diligence on the stability and reputation of the firms with whom you interact for applications. A well-intentioned company that falls on hard times is unlikely to invest in support of a new security problem, and a product historically marred by vulnerabilities will likely continue to offend.

4. Illuminate Upside for Stakeholders and Vendors

Your increased focus on application security is likely to make software acquisition or application development more difficult. Make time to effectively illustrate and communicate the benefits to your stakeholders accordingly. Application users can proceed with confidence, understanding that there are now fewer opportunities for malicious actors to co-opt or disrupt their services. Through negotiations, vendors acquire better relationships – even concessions – just by improving the security of the software they write. Those improvements are then available to all current and future clients.

It’s critical to tell the story of improved application security to your management team, peers, and business leaders. The negative impact of vulnerable applications is limited only by the combined transactional, reputational, and reliability risk that an exploit poses. By documenting problems fixed and vulnerabilities mitigated, there is a clear path to a safer, more predictable infrastructure.

To learn more about application security and the right strategy for your organization, contact us at appsec@nuharborsecurity.com, or complete the form below.

Included Topics

  • Application Security,
  • Cybersecurity Technology
Jack Danahy
Jack Danahy

Jack (he/him) is the Vice President of Strategy & Strategic Services at NuHarbor Security where he spearheads the research and development of the unified security service platform, striving to simplify cybersecurity for all organizations. Prior to joining NuHarbor Security, Jack founded three successful security software companies that were acquired by Watchguard Technologies, IBM, and Alert Logic, and has received 12 patents for his security innovations. Jack is a sought-after cybersecurity speaker and writer; his insights and opinions have been featured in prestigious publications such as Forbes, Fortune, the New York Times, and the Washington Post, solidifying his influence and expertise.

Related Posts

Industry Insights 2 min read
New Insights From the 2023-2024 SLED Cybersecurity Priorities Report
Read More
3 min read
4 Steps to a Rock-Solid Cybersecurity Strategy
Read More
2 min read
Mastering the Art of Cybersecurity Communication: 6 Questions Every Leader Must Answer
Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.