Their options range from using online app-building tools, to taking crash courses in computerprogramming and coding languages, hiring a costly professional on contract, or recruiting a full-time developer.
Taking advantage of cheaper processing power, the rise of new computerlanguages and the increasing urgency of the problem, these companies' own complex software seeks flaws in programming grammar, reverse-engineers applications to see that they do what they're supposed to and emulates the malicious hacks they will face once they're put in use.