SHARE
Facebook X Pinterest WhatsApp

Applications Move to the Top of the Security Agenda

After spending billions of dollars trying to secure network perimeters, IT organizations are discovering, sometimes through painful experience, that hackers and developers of various forms of malware are increasingly focused on compromising applications. That only makes sense because, after all, that’s where the valuable data is. At the same time, these attacks are getting more […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jun 16, 2010

After spending billions of dollars trying to secure network perimeters, IT organizations are discovering, sometimes through painful experience, that hackers and developers of various forms of malware are increasingly focused on compromising applications.

That only makes sense because, after all, that’s where the valuable data is. At the same time, these attacks are getting more targeted in order to fly under the radar of security solutions that are designed to look for specific types of signatures. The end result is not only more dangerous attacks, but also ones that are increasingly invisible to IT organizations.

The end result is that no one is really sure how many applications are compromised. But according to a recent survey of 300 IT professionals that was conducted by Fortify Software at the recent Infosecurity Europe 2010 conference, 56 percent said software in use within their organization was compromised. Worse yet, 16 percent said maybe and 7 percent said they didn’t know.

Perhaps even more disturbing, 83 percent said that the commercial software they buy off-the-shelf comes with all kinds of unknown vulnerabilities, which accounts for why IT organizations spend so much time patching software these days.

Barmak Meftah, chief products officer for Fortify, says a big part of the problem is that application developers really don’t focus on security. It’s only when the security team sits down with developers to show them what they are doing to make it easy for outsiders to compromise their software that any real fundamental change takes place.

Meftah says application developers will be focusing a lot more on security with the advent of cloud computing, which in many cases comes with fairly detailed security requirements as part of the service level agreement mandated by the cloud computing provider.

What all this means is the security landscape as a whole is going through a profound transformation that will ultimately change the way application software is developed. In the meantime, it’s now incumbent on most IT organizations to access their application security because what worked well last year is increasingly becoming irrelevant today.

Applications Move to the Top of the Security Agenda - slide 1

Click through for findings from a recent survey by Fortify Software.

Applications Move to the Top of the Security Agenda - slide 2

At least more than half are certain there are.

Applications Move to the Top of the Security Agenda - slide 3

And the number of attacks aimed at applications is growing.

Applications Move to the Top of the Security Agenda - slide 4

Many don’t know, and those that say never may not know either.

Applications Move to the Top of the Security Agenda - slide 5

About half have some personal experience with hacking.

Applications Move to the Top of the Security Agenda - slide 6

Most are doing penetration testing on their own sites.

Applications Move to the Top of the Security Agenda - slide 7

Most are applying a mix of solutions.

Applications Move to the Top of the Security Agenda - slide 8

Commercial software frequently has more vulnerabilities than custom software.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.