Application Security a Growing Priority Among Security Pros
A Dark Reading survey finds most IT and security managers would rather wait to deploy applications than risk security flaws.
A majority of IT and security managers think security is important enough to delay application deployment, as indicated by a Dark Reading survey that found 78% are willing to handle delays with the hope of creating more secure software.
Dark Reading surveyed 173 IT and cybersecurity professionals on a variety of topics related to application security, software development practices, commercial software use, and the relationship between enterprise IT security groups and software development teams. Results reveal the massive attack on network monitoring software SolarWinds Orion at the end of 2020 sent a chill down the spine of many security managers and heightened enterprise concerns over cyber compromise. More than half (52%) say incidents like the SolarWinds breach have caused changes in their evaluation and vetting processes for third-party app providers; 53% describe such apps as putting them at greater risk of a data breach.
Among some of the other survey highlights:
34% of IT and security managers say attackers with deep knowledge of application vulnerabilities present the greatest threat to app security.
72% perceive the average application developer at their organization as being either "very knowledgeable" or "somewhat knowledgeable" about security.
49% have an agile development process and have either fully or partially adopted a DevOps approach to software development.
59% believe their organization is either "very knowledgeable" or "knowledgeable" about remediating new app vulnerabilities.
41% treat API security the same as Web application security.
Read the full report here.
About the Author(s)
You May Also Like
Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024