With the proliferation of interconnected third-party applications, new strategies are needed to close the security gap.