All applications risk being hacked without robust, properly configured application security controls in place. Whereas...