Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
BURLINGTON, MA -- (Marketwired) -- 06/23/15 -- Veracode, a leader in protecting enterprises from today's pervasive web and mobile application threats, today released the 2015 State of Software Security report that reveals concerning benchmark analytics from its cloud-based platform. The reports shows that web and mobile applications produced or used by government organizations are more likely than those in other industries to fail standard security policies like the OWASP Top 10 when initially assessed for risk.
Veracode's analytics also show that government organizations only remediate 27 percent of application vulnerabilities once detected -- last among the seven vertical markets analyzed. Moreover, government applications have the highest prevalence of SQL Injection vulnerabilities -- commonly used to steal sensitive data from databases -- upon initial assessment. In contrast, financial services and manufacturing ranked best across most categories, with healthcare, retail and hospitality near the bottom.
As organizations increasingly rely on software to drive their businesses, the threat surface available to cyberattackers has dramatically expanded. As a result, one of the leading causes of data breaches over the past two years has been vulnerable applications, according to Verizon's 2015 Data Breach Investigations Report. Yet, analytics collected from more than 200,000 application risk assessments over the last 18 months found a wide disparity in how the problem is addressed across industries.
Organized into seven vertical markets for simplified benchmarking -- government, financial services, retail and hospitality, technology, manufacturing, healthcare and other -- Veracode's 2015 State of Software Security Report reveals that:
Significant Impact of Remediation Coaching Services
The data also shows that remediation coaching services have a big impact on reducing application-layer risk. Development organizations that leverage Veracode's remediation coaching services improve the security of their code by a factor of two and a half times compared to those that choose to do it on their own. Delivered by world-class security and development experts, these on-demand services help developers understand secure coding practices and remediate vulnerabilities more quickly and efficiently.
"Every industry faces the challenge of securing web and mobile applications -- which are continuously growing in both volume and complexity -- across disparate and geographically-distributed development teams," said Chris Wysopal, Veracode CISO and CTO. "In 2014, we helped our customers identify and remediate 4.7 million vulnerabilities, significantly reducing enterprise risk. This report clearly shows that industries that 'get it' have been able to achieve substantial success while others still struggle to manage the problem at scale."
Enhanced Analytics for Improved Risk Visibility
To help customers address the challenge of benchmarking disparate development teams and drive continuous improvement across both in-house and externally-sourced code, Veracode has recently enhanced its built-in security analytics capabilities with a new business intelligence (BI) engine. The new analytics engine -- integrated with Veracode's central cloud-based platform -- gives customers an instant view of their risk posture and the current status of their global application security programs.
In particular, the self-service data mart can be queried to provide customizable views of key metrics such as scanning volume, compliance with corporate policies, and remediation status, simplifying the creation of management-level dashboards. Built-in comparison charts allow benchmarking by business unit or development team; by severity of vulnerabilities and business criticality of applications; and by third-party software vendor.
The new analytics capability also makes it easier for multiple stakeholders across the organization -- including management, security, development and internal audit professionals -- to collaborate and share information using consistent policies and metrics, to drive towards better software security.
The full State of Software Security report can be found at: https://info.veracode.com/state-of-software-security-report-volume6.html
Methodology
The State of Software Security draws on continuously-updated information from Veracode's cloud-based platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code uploaded to the platform by our customers, across a range of industries and geographies.
This report captures data collected over the past 18 months from 208,670 application scans performed via our cloud-based platform. It summarizes information about applications produced by organizations from 34 different industries that we have organized into seven vertical markets.
About Veracode
Veracode is a leader in securing web, mobile and third-party applications for the world's largest global enterprises. By enabling organizations to rapidly identify and remediate application-layer threats before cyberattackers can exploit them, Veracode helps enterprises speed their innovations to market -- without compromising security.
Veracode's powerful cloud-based platform, deep security expertise and systematic, policy-based approach provide enterprises with a simpler and more scalable way to reduce application-layer risk across their global software infrastructures.
Veracode serves hundreds of customers across a wide range of industries, including nearly one-third of the Fortune 100, three of the top four U.S. commercial banks and more than 20 of Forbes' 100 Most Valuable Brands. Learn more at www.veracode.com, on the Veracode blog and on Twitter.
Press and Media Contacts for Veracode:Press and Media Contacts for Veracode:
Eric Seymour
Global PR Manager
Email Contact
339-674-2635
Bill Bode
Highwire PR
Email Contact
415-963-4174 x49
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs