Friday, 06th December 2019

Open source components cause digital risk

Prevalent use of open-source and third-party components creating unmanaged risk: Approximately 97 percent of Java applications contained at least one component with a known vulnerability.

Veracode has released the findings in its annual State of Software Security Report (SoSS). The seventh edition of the report presents metrics drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months. The report revealed that the continued and persistent use of components in software development is creating systemic risk in our digital infrastructure. However, the report also found that companies achieve accelerated benefits when their application security programmes reach maturity. These finding indicate that the growing trend of focusing on digital risk at the application layer and building security into DevOps processes (DevSecOps) can yield great results for organisations in reducing risk without slowing down software development.
Veracode’s analysis revealed the growing risk caused by the proliferation of vulnerable open source components. Veracode found that a single popular component with a critical vulnerability spread to more than 80,000 other software components, which were in turn then used in the development of potentially millions of software programmes. Approximately 97 percent of Java applications contained at least one component with a known vulnerability.
“The prevalent use of open source components in software development is creating unmanaged, systemic risks across companies and industries,” said Brian Fitzgerald, CMO, Veracode. “Today, a cybercriminal can focus on a single vulnerability in one component to exploit millions of applications. Software components are used by every industry and for software of all kinds, and given our dependence on applications, the ease at millions of applications can be breached has the potential to create havoc in our digital infrastructure and economy.”
Veracode’s research also highlights the challenges that still exist in software development more broadly. For example, 60 percent of applications failed basic security requirements upon first scan. However, the report found that when companies follow best practices and implement programmes with consistent policies and practices for secure development, they are able to remediate vulnerabilities at a higher rate. The study showed that the top quartile of companies fix almost 70 percent more vulnerabilities than the average organisation. Additionally, best practices like remediation coaching and eLearning can improve vulnerability fix rates by as much as six-times. Developers who test unofficially using Developer Sandbox scanning improve policy-based vulnerability fix rates by about two-times.
“The ability to frequently test applications is going to be crucial to the success of secure development initiatives at companies with continuous development and deployment models like those found in DevOps environments,” said Chris Wysopal, co-founder and CTO, Veracode. “Our platform data shows that more companies are starting to test applications multiple times throughout the development lifecycle. The average number of security tests per app was seven, and some apps were scanned 700-800 times in an 18-month period. We are encouraged by this information because it suggests companies are more deeply embedding security into their software development processes.”
BitDam adds an important layer of protection for Scotland’s largest independent dairy.
The advanced solutions elevate security and provide enhanced protection.
bluedog Security Monitoring has launched a new compliance module which enables users to check the st...
Allows on-demand API access to turnkey cyberthreat expertise.
The experts at Positive Technologies have released their cybersecurity threatscape findings for the...
Trend Micro has launched Trend Micro Cloud One, a security services platform for organizations buil...
Businesses across the globe risk being hit by potentially disastrous cyber-attacks because they aren...
Commodities trader finds the sweet spot to expose hidden attackers, spot privilege misuse and perfor...