Applications Move to the Top of the Security Agenda

Michael Vizard

[slideshow]

After spending billions of dollars trying to secure network perimeters, IT organizations are discovering, sometimes through painful experience, that hackers and developers of various forms of malware are increasingly focused on compromising applications.

That only makes sense because, after all, that's where the valuable data is. At the same time, these attacks are getting more targeted in order to fly under the radar of security solutions that are designed to look for specific types of signatures. The end result is not only more dangerous attacks, but also ones that are increasingly invisible to IT organizations.

The end result is that no one is really sure how many applications are compromised. But according to a recent survey of 300 IT professionals that was conducted by Fortify Software at the recent Infosecurity Europe 2010 conference, 56 percent said software in use within their organization was compromised. Worse yet, 16 percent said maybe and 7 percent said they didn't know.

Perhaps even more disturbing, 83 percent said that the commercial software they buy off-the-shelf comes with all kinds of unknown vulnerabilities, which accounts for why IT organizations spend so much time patching software these days.

Barmak Meftah, chief products officer for Fortify, says a big part of the problem is that application developers really don't focus on security. It's only when the security team sits down with developers to show them what they are doing to make it easy for outsiders to compromise their software that any real fundamental change takes place.

Meftah says application developers will be focusing a lot more on security with the advent of cloud computing, which in many cases comes with fairly detailed security requirements as part of the service level agreement mandated by the cloud computing provider.

What all this means is the security landscape as a whole is going through a profound transformation that will ultimately change the way application software is developed. In the meantime, it's now incumbent on most IT organizations to access their application security because what worked well last year is increasingly becoming irrelevant today.



Add Comment      Leave a comment on this blog post
Jun 24, 2010 3:06 PM Anonymous Anonymous  says:
With Cloud computing, would you recommend running each app inside its own gaol?The worst that could then happen is one clients data is corrupt. Would you recommend BSD for the security minded clients and if not, why? Reply

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.