62% of companies experienced security breaches in critical applications
Posted on 29 April 2009.

Veracode announced the findings of an independent commissioned study conducted by Forrester Consulting titled, “Application Risk Management in Business Survey.” The survey revealed that enterprises are struggling to protect their organizations from the costly and growing threat of application security breaches. The study interviewed development, security and risk professionals across the UK and US, and confirmed that risk associated with insecure software is a very real concern and a top priority for management and developers alike.

The survey of over 200 respondents from 180 different businesses across various industry sectors, found that more than 62% of organizations have experienced a security breach in the past 12 months due to exploitation of vulnerabilities in their critical software applications. The study also found that while companies feel they know the make-up and business criticality of their mixed application portfolios, there is little confidence in the security quality of their applications.

Key findings:
  • Exploitation of vulnerabilities in software is a major cause of data breaches. 62% of companies responded that they have experienced security breaches which exploited vulnerabilities in software in the last 12 months.
  • Security as part of the software development process is not widely practised. Only 34% of companies have a comprehensive SDLC (software development life cycle) process which integrates application security.
  • More than half of companies (57%) use outsourcing regularly for business critical. Yet only one third of companies require rigorous security testing before accepting and implementing code from outsourcers.
  • Only 13% of companies know the security quality of business critical applications. Very few respondents know the security quality of all their business applications which they deem critical to the enterprise.
  • Considering that 50% of companies are using COTS (custom-off-the-shelf software) or Outsourced code to handle sensitive data (financial information, PII, health info etc). this indicates why the risk and resultant fallout from breaches is so great.
  • Enterprises are increasing scrutiny on ISVs (independent software vendors) and outsourcers for delivering secure code. 60% of respondents stated they are actively incorporating (or have already adopted) third party security assessments as part of software procurement processes for COTS or outsourced code.
  • Most enterprises lack formal secure development training programmes. 57% of organisations don’t have systematic training programmes addressing application security training for their developers.
  • Security spending is not immune to economic conditions. 64% of respondents stated that while application security is important to them, they are struggling to meet the challenge on existing budgets.
The results of the survey were consistent between UK and US organizations. The UK uses less open source and outsourced applications extensively for business critical functions and has a lower of ratio of security personnel to developers, but the results in terms of breaches were in essence the same.





Spotlight

Leveraging network intelligence and deep packet inspection

Posted on 26 November 2014.  |  Tomer Saban, CEO of WireX Systems, talks about how deep packet inspection helps with identifying emerging threats, the role of network intelligence, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Nov 27th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //