A company wants to secure a newly developed application that is used to access sensitive information and data from corporate resources. The application was developed by a third-party organization, and it is now being used heavily, despite lacking the following controls:
✑ Certificate pinning
✑ Tokenization
✑ Biometric authentication
The company has already implemented the following controls:
✑ Full device encryption
✑ Screen lock
✑ Device password
✑ Remote wipe
The company wants to defend against interception of data attacks. Which of the following compensating controls should the company implement NEXT?
sm24
3 years, 2 months agoDrChats
3 years, 5 months agovorozco
3 years, 2 months agovorozco
3 years, 2 months agoSoniSoni
3 years, 8 months agoD1960
3 years, 8 months agoD1960
3 years, 12 months ago