Watch this video on YouTube
In your role as the information security manager, you've identified that a newly launched mobile app doesn't align with the company's authentication protocols. To manage this discrepancy effectively, what should be your primary step?