Managing risk and growing the global app ecosystem
![]()
WRITTEN BY: MARCUS LAW
PRODUCED BY: JAKE MEGEARY
Appleâs 2009 advert â which coined the phrase âThereâs An App For Thatâ â was just the beginning. Over the last 13 years, there has been a global explosion of app downloads ranging from mobile games to productivity tools. And, with figures from Statista suggesting there were 230bn global mobile app downloads in 2021, there are no signs of a slowdown.
For AppLovin, a leading growth platform with an ultimate mission to grow the global app ecosystem, the goal is to help developers expand their audience and their revenue while helping the industry continue to thrive.
Since launching in 2012, AppLovin has been instrumental in defining many of the worldâs most popular apps and game studios. The companyâs leading mobile marketing and monetisation platform provides app developers with a powerful, full-stack solution to solve their missioncritical functions like user acquisition, monetisation, and measurement.
âReally, at the end of the day, the goal is to grow that whole app ecosystem,â explains Jeremiah Kung, AppLovinâs Global Head of Information Security and Compliance.
âGrowing up, we didn't have cell phones, we barely had the internet,â he laughs, âand now it's different.â
âEverything's on the phone, and apps are growing,â he adds. âWe want to grow that ecosystem so that everyone is successful â
AppLovin is on a mission to provide app developers with the tools they need to thrive â balancing speed and comprehensive information security is vital
Data Theoremâs solutions are powered by its award-winning Analyzer Engine, which leverages a new type of dynamic and runtime analysis that is fully integrated into the SDLC, and enables organizations to conduct continuous, automated security inspection and remediation.
Organizations today need tools that are purpose built for securing modern application stacks to prevent data breaches. Past-generations of runtime AppSec tools (WAFs, RASPs, EDRs) are unable to address critical areas of modern application stacks such as cloud-native applications.
As an example, serverless applications with APIs, such as AWS Lambda, cannot be secured using traditional web application firewalls (WAFs), runtime application self-protection (RASPs), or endpoint detection and response (EDR) agents. This is because there are no accessible operating systems for agent installation nor traditional network perimeters with ingress/egress points. Data Theorem now uniquely delivers runtime defenses and observability across its entire product suite, addressing security gaps in modern application exposures commonly found with cloud-native stacks.
Data Theorem Active Protection is a runtime defense and observability
offering. It works across Data Theoremâs product portfolio to help customers enable application-layer security defenses across their application stacks from the client layer web and mobile apps to the API data transport layer and lastly cloud infrastructure. The runtime defenses include attack prevention, OWASP Top 10 rules, known malicious sources, policy violations of encryption levels, authentication types, authorization rules, and a variety of custom rule checks including preventing Broken Object Level Authorization (BOLA) attacks. Further, organizations also need increased observability (logging, tracing, trending) before enforcing security policies because of the dynamic nature of their modern application stacks. Customers can enable Data Theoremâs Active Protection through the use of their SDKs (software development kits), application extensions (Lambda layers), and AppSec proxy (L7 sidecar proxying).
from the developers and the applications to the businesses and the advertisements behind that â so that it's a win-win for everybody.â
A risk-off approach to cybersecurity Trust and transparency continue to be incredibly important for both organisations and individuals, with concerns around data protection increasing in recent years. As Kung explains, from an information security perspective, by not storing personal information from devices, AppLovin takes a ârisk-offâ approach.
âFrom a security point of view,â he says, âour technology never knows who owns the device and only captures what ad types that device interacts with. For example, it's more like: âThat device likes Wordscapes games, so letâs send them more ads for Wordscapes-type gamesâ as they will be more likely to download. We never know who the owner of the device is,â Kung adds.
âWe removed the significant risk from the equation, which ensures significant risk reduction from an InfoSec perspective.â
The app market may have been on a meteoric rise in recent years, but as with all industries, there is a negative side, with bad actors posing daily threats. For Kung, who joined the business in May 2022, transparency is particularly important when it comes to cybersecurity.
âI try to stay as plugged in as I can to the business so I can understand the threat and risk,â he comments. âI've added tools and processes, but I think what really counts from the cybersecurity piece at this point is transparency.â
âThis is a highly technical company with a lot of smart people. My first priority for information security was to conduct assessments; I did my poking and prodding, and penetration testing.â
âThey have made some really smart choices and done some really clever things,â Kung adds. âWeâre now focused on adding enhancements and improvements over time. The one improvement we added for the cyber side was transparency.â
For Kung, a cybersecurity professional with more than 20 years of experience in the industry, the key factor to driving a successful cybersecurity programme is down to the people.
As he explains, when joining AppLovin, the first thing he did was create an advisory programme to sit and talk to developers, establishing conversations and processes around when to introduce InfoSec checks.
âWeâd have a conversation around what the developers are working on to determine the best point in time for my team to conduct penetration tests,â Kung says. âAnd weâll have regularly scheduled conversations to check in.â
In a fast-paced environment such as the technology industry, itâs also highly important not to sacrifice the speed of development. Having joined AppLovin following several cybersecurity roles at financial institutions, Kung is particularly aware of the differences between the east and west coast working in cybersecurity.
INDUSTRY: COMPUTER SOFTWARE LOCATION: CALIFORNIA, US
Jeremiah Kung is AppLovinâs Global Head of Information Security and Compliance. AppLovin enables developers to grow their business with a powerful set of industry-leading solutions. Jeremiah is a risk-based CyberSecurity and Technology executive with strong beliefs in innovation and partnership. He has led multiple digital transformations and has found that the constant drive to improve along with the business is the key factor to leading a successful security program in any company. Jeremiah is a results-oriented hands-on cybersecurity professional with 20 years of successful history of leading cybersecurity, data privacy and risk management programs
âComing from a banking organisation or FinTech, youâre so highly regulated,â Kung comments. âYou have to find everything and fix everything before it goes to production. The CISO must sign off on everything, and it doesnât go to production until theyâve done all their tests and theyâre happy that everythingâs fixed.â
JEREMIAH KUNG GLOBAL HEAD OF INFORMATION SECURITY AND COMPLIANCE, APPLOVINâBut here,â he adds, âour business success depends on the velocity of our releases. So, itâs all about how you find that perfect momentum of putting the security controls in place but not slowing the process down.â
âThatâs whatâs really fascinating â finding that balanced mix. And at the end of the day, it comes down to people.â
âWe have extremely talented developers who are willing to work with us. We have tools that give us visibility, and we are also willing to work with the team. Iâm not going to hand them scan reports and say, âHere are
âOur business success depends on the velocity of our releases. Itâs all about finding that perfect momentum of putting the security controls in without slowing the process downâ
some findings, go fix themâ. I commonly say, âThese are the findings, let me look at them, and perhaps we find things which might be an issueâ. This allows us to track if itâs a quick fix â and if not, weâll ensure itâs prioritised in the next release.â
With a rising number of security breaches arising from third-party relationships,
managing third-party risk is a particularly relevant issue in cybersecurity â especially in light of the SolarWinds attack, which opened many eyes to the dangers of insufficient onboarding and monitoring of third-party vendors.
âI aim to look at all threats and ensure theyâve been looked at,â Kung explains. âThird-party risk is a great one. For vendors weâre doing business with, we ask questions to ensure that they are properly secured, and will protect our data.â
âYou don't want to say, 'Here are 1,000 questions, please answer them', to every company you work with. That could potentially slow things down,â he says. âInstead, we'll do our own assessment, then weâll come regularly to reassess and ask questions.â
Particularly in the cybersecurity world, a strong network of partnerships is vital â
âEspecially in a SaaS world, you can't be on your own and just have your own developers build everythingâ
and AppLovin is no different. In addition to a partnership with Google, Kung explains that working with smaller companies, such as Data Theorem and MAKINSIGHTS, has significant advantages.
âI have liked working with the smaller, hungrier companies because they're willing to work with you,â he muses. âEspecially in a SaaS world, you can't be on your own and just have your own developers build everything. As smart and as efficient as they are, we do need to partner with some vendors out there.â
âWith Data Theorem, I met with their CEO quarterly, when I was back at EastWest Bank,â Kung says. âAt the time, we were building mobile apps to do business banking in China as well as the United States, so the security needed to be top-notch.â
When looking for a tool to protect from Magecart attacks, a discussion with Data Theoremâs CEO led to the development of a âhack toolkitâ, which could detect a multitude of vulnerabilities with a push of a button.
âItâs been interesting to watch them grow their business from just scanning the mobiles to the web to then creating a piece for cloud security, and followed this up by creating a piece for API security,â Kung says. âThese were all the things I was worried
about, and now I had just the tool I needed in order to find this solution.
âMAKINSIGHTS is another great example of a nimble company: they came on board and provided excellent service by supplying us with skilled former 'Big Four' consultants, many based out of LATAM,â he adds. âWorking with MAKINSIGHTS brings the latest in cyber processes, policy, governance advice, risk assessment, pen testing âessentially the full gambit of Information Security from an outside perspective.â
AppLovin has also been partnering with Google, utilising cutting-edge tools in both the cyber and the cloud space.
âA lot of times, solutions are being built on-premise and tend to be legacy, and slower,â Kung explains. âGoogle is doing some pretty innovative work now in the cloud, engineering-wise. By partnering
âWhen weâre evaluating a vendor weâre starting to do business with, we do deeper dive assessments to see if they are properly secured and whether they are going to protect our dataâ
HEAD
with Google there are a lot of interesting options we're considering including looking at information security from a different point of view than the typical push-button compliance checklist.â
In an increasingly cloud-based environment, Kung predicts there will be shifts in the way organisations manage their information security.
âAt the end of the day, security never really has an end state,â he says. âThreats are always changing and the business is always evolving. Eventually, more and more systems are going to move to the cloud. Larger institutions will be tougher, but smaller companies and high technology companies are mostly going to be in the cloud. And, if theyâre not already there, theyâre going to start moving to Kubernetes and to serverless functions, which is really going to shift the way we do information security.â
With different threat factors and different attack surfaces to look at, organisations need to be constantly assessing security threats while thinking outside the box.
âPasswords are pointless,â Kung states. âYou really should be doing multi-factor authentication (MFA) â those are ways of thinking outside the box of technology.â
âI've seen some really cool ideas from Transmit Security, who had an awesome tool that would get to know who you are,â he says. âWe would know a user held the phone in a particular way, so we can authenticate it â a robot, for example, wouldnât be holding it at all. I donât know if that's the ultimate solution, but out-of-the-box thinking like that is where we need to go.â
And, with AppLovinâs goal to continue growing the app ecosystem, InfoSec will similarly continue to hold a vital role.
âI'm definitely looking at every new product we're coming out with, making sure it's secure and focusing on helping grow the business without slowing it down,â Kung comments.
âFor AppLovin, the goal is to continue to grow the business and the app ecosystem, even at a time of economic uncertainty,â concludes Kung. âWe're focused on growing that ecosystem, helping it thrive, and moving it forward.â
âWhen you do cyber insurance forms or client security inquiries, the question asked is âhow long is your password?â
That's not the right questionâ
1100 Page Mill Road Palo Alto CA 94304 www.applovin.com
POWERED BY:
POWERED BY: