Watch this video on YouTube
What action will BEST mitigate information security risks during the development of in-house applications?