Survey: Apps at Risk for Reverse Engineering
One reason: IT doesn't have adequate controls in place to manage risks from (a) vulnerability exploitation, (b) IP theft, (c) privacy violations and (d) piracy and others. Of those surveyed:
"Security, compliance and risk management stakeholders need to reach a consensus on the controls that are appropriate to manage what may otherwise become material risks," the survey states.
"As .NET and Java applications become increasingly ubiquitous, the risks that stem from uncontrolled access to source code are also increasing proportionately," said Gabriel Torok, President at PreEmptive Solutions, one underwriter of the survey.