Which Web Programming Language Is Most Secure?

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9
Previous Next

Click through for a deeper look into the security of a number of the most popular programming languages, including .NET, Java, ColdFusion, ASP and more, as identified by WhiteHat Security.

Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

WhiteHat Security, a Web security company, recently announced the latest edition of the "WhiteHat Security Website Security Statistics Report," which takes a deeper look into the security of a number of the most popular programming languages, including .NET, Java, ColdFusion, ASP and more.


"Deciding which programming language to use is often based on considerations such as what the development team is most familiar with, what will generate code the fastest, or simply what will get the job done," said Jeremiah Grossman, founder and iCEO of WhiteHat Security. "How secure the language might be is simply an afterthought, which is usually too late.

"As an industry we lack sufficient security data that teams can rely on in the language selection process for their project," continued Grossman. "This report approaches application security not from the standpoint of what risks exist on sites and applications once they have been pushed into production, but rather by examining how the languages themselves perform in the field. In doing so, we hope to elevate security considerations and deepen those conversations earlier in the decision process, which will ultimately lead to more secure websites and applications."

WhiteHat researchers examined the vulnerability assessment results of the more than 30,000 websites under WhiteHat Security management to measure how the underlying programming languages and frameworks perform in the field. With that information, the report yields key findings around which languages are most prone to which classes of attack, how often and for how long, as well as a determination as to whether popular modern languages and frameworks yield similar results in production websites.

 

More Slideshows

Misc38-190x128 Five Critical Tenets of Identity and Access Management

The identity and access management (IAM) market is experiencing a renaissance with the emergence of new options for how and where to deploy IAM technology, both on-premises and as a service. ...  More >>

AlienVaultCFOSecurityInvestment0x Five Ways a CFO Can Invest in Securing Their Organization

Considering the costs related to security, it's no wonder that the CFO might struggle a bit in regards to investing in this part of the business. ...  More >>

Lumension10QsSecurityVendors0x 2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors

In the spirit of 2015 planning, now is the time of year when IT teams start to tackle big, complicated issues like endpoint and mobile security. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.