Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Application Security Processes Not Implemented at Many Enterprises, Survey

A new survey of developers and security professionals revealed that many organizations are still not baking security into the application development process.

According to research by Security Innovation and the Ponemon Institute, 80 percent of the developers and two-thirds of the security personnel surveyed do not have a process where they build security into their software applications. In addition, 47 percent of developers state that there is no formal mandate in place to remediate vulnerable software code.

A new survey of developers and security professionals revealed that many organizations are still not baking security into the application development process.

According to research by Security Innovation and the Ponemon Institute, 80 percent of the developers and two-thirds of the security personnel surveyed do not have a process where they build security into their software applications. In addition, 47 percent of developers state that there is no formal mandate in place to remediate vulnerable software code.

Those stats only tell part of the story – according to the survey, 59 percent of the developers and close to half of the security pros reported their company had experienced between one and 10 data breaches during the past two years due to an application being compromised or hacked.

“We set out to measure the tolerance to risk across the established phases of application security, and define what works and what hasn’t worked, how industries are organizing themselves and what gaps exist,” said Larry Ponemon, CEO of the Ponemon Institute, in a statement. “We accomplished that, but what we also found was a drastic divide between the IT Security and Development organizations that is caused by a major skills shortage and a fundamental misunderstanding of how an application security process should be developed. This lack of alignment seems to hurt their business based on not prioritizing secure software, but also not understanding what to do about it.”

The survey fielded answers from more than 800 IT security pros and developers from enterprise organizations. In addition to the other statistics, researchers found that exploited vulnerable code in Web 2.0/social media applications ranked as the second-highest root cause of data breaches, behind SQL injection attacks, according to 29 percent of developers and 24 percent of security personnel.

“We commissioned this study with Ponemon because we feel the industry still needs a much higher level of awareness around application security,” said Ed Adams, CEO of Security Innovation, in a statement. “What emerged in this study was that companies don’t seem to be looking at the root causes of data breaches, and they aren’t moving very fast to bridge the existing gaps to fix the myriad of problems. The threat landscape has grown substantially in scope, most notably as our survey respondents stated that Web 2.0 and mobile attacks are the targets of the next wave of threats beyond just Web applications.”

Related Reading: How Can Developers Protect Legitimate Mobile Applications?

Related Reading: Developer Challenges Force Insecure Devices to Market

Advertisement. Scroll to continue reading.
Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Linx Security has appointed Sarit Reiner Frumkes as Chief Technology Officer.

Tabitha Craig has been named the CISO of the Congressional Budget Office (CBO).

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.