Skip to main content

Report: Less complex applications are more likely to have security vulnerabilities than their more complex counterparts

While one might anticipate that the more complex an application is, the more likely it is to have security vulnerabilities, a recent analysis from Black Duck found the opposite to be true. 

Its 2024 Software Vulnerability Snapshot report analyzed data from 200,000 dynamic application security testing scans for 1,300 applications across 19 different industry sectors. 

The report categorizes small complexity apps as those with minimal interactivity and a simple crawl tree, while higher complexity apps are those that have many interactive elements and dynamically generated content. 

The results show that small and medium complexity applications were more likely to have critical vulnerabilities than larger complexity ones. 2,039 vulnerabilities were found in small complexity apps, 1,679 were found in medium complexity apps, and 505 were found in large complexity apps. 

“This metric suggests that many organizations are underestimating the security needs of sites containing fewer complex applications,” Black Duck wrote in a blog post about the report. 

Some of the most high-risk industry sectors were the ones that suffered from the most critical vulnerabilities. Finance and insurance had 1,299 critical vulnerabilities, healthcare and social assistance had 992, and information services had 446. Agriculture, mining/quarrying and oil/gas extraction, construction, and waste management were among those with little to no vulnerabilities. 

However, despite the larger prevalence of vulnerabilities, finance and insurance companies also have very fast response times compared to other sectors, with it taking 28 days to close critical vulnerabilities for small complexity apps, 53 days for medium complexity apps, and 78 days for larger complexity apps. 

Healthcare and social assistance companies were actually able to close critical vulnerabilities faster for larger complexity apps than smaller ones. It took them 87 days to close critical vulnerabilities on small complexity apps and only 20 days for larger complexity apps. 

Utilities and educational services had significantly slower response times. It takes utilities companies 107 days to resolve vulnerabilities for small complexity apps and 876 days for medium complexity apps. In education, it takes an average of 342 days for small complexity apps and 111 days for medium complexity apps. 

“These variations highlight the impact of resource allocation and regulatory pressures on security initiatives across different sectors,” Black Duck wrote. 

Black Duck also found that of the 96,917 vulnerabilities it analyzed, the most common were cryptographic failures, injection vulnerabilities, and security misconfigurations.

There were 30,726 vulnerabilities that were categorized as cryptographic failures, 4,882 of which were deemed critical-risk instances. This type of vulnerability affected 86% of companies surveyed. 

Injection vulnerabilities, which include SQL injection and cross-site scripting, were responsible for 4,814 vulnerabilities. Over half of them (2,491) were considered to be critical instances. 

Security misconfigurations were responsible for 36,000 vulnerabilities, and while most were categorized as “informational” and requiring no immediate action, they can still represent potential risks, Black Duck explained. This type of vulnerability affected 98% of companies analyzed. 

“The high number of vulnerabilities found from the past year is a clear wake-up call that businesses cannot remain stagnant when deploying new security measures,” said Jason Schmitt, CEO of Black Duck. “The longer it takes for an organization to patch a vulnerability, the larger the chance of exploitation. Software risk equates to business risk, and with today’s malicious actors being more sophisticated than ever, it’s increasingly important that businesses across every sector build trust in their software by implementing a comprehensive and integrated approach.”  

The post Report: Less complex applications are more likely to have security vulnerabilities than their more complex counterparts appeared first on SD Times.



from SD Times https://ift.tt/EuO6GXd

Comments

Popular posts from this blog

Difference between Web Designer and Web Developer Neeraj Mishra The Crazy Programmer

Have you ever wondered about the distinctions between web developers’ and web designers’ duties and obligations? You’re not alone! Many people have trouble distinguishing between these two. Although they collaborate to publish new websites on the internet, web developers and web designers play very different roles. To put these job possibilities into perspective, consider the construction of a house. To create a vision for the house, including the visual components, the space planning and layout, the materials, and the overall appearance and sense of the space, you need an architect. That said, to translate an idea into a building, you need construction professionals to take those architectural drawings and put them into practice. Image Source In a similar vein, web development and design work together to create websites. Let’s examine the major responsibilities and distinctions between web developers and web designers. Let’s get going, shall we? What Does a Web Designer Do?

A guide to data integration tools

CData Software is a leader in data access and connectivity solutions. It specializes in the development of data drivers and data access technologies for real-time access to online or on-premise applications, databases and web APIs. The company is focused on bringing data connectivity capabilities natively into tools organizations already use. It also features ETL/ELT solutions, enterprise connectors, and data visualization. Matillion ’s data transformation software empowers customers to extract data from a wide number of sources, load it into their chosen cloud data warehouse (CDW) and transform that data from its siloed source state, into analytics-ready insights – prepared for advanced analytics, machine learning, and artificial intelligence use cases. Only Matillion is purpose-built for Snowflake, Amazon Redshift, Google BigQuery, and Microsoft Azure, enabling businesses to achieve new levels of simplicity, speed, scale, and savings. Trusted by companies of all sizes to meet

2022: The year of hybrid work

Remote work was once considered a luxury to many, but in 2020, it became a necessity for a large portion of the workforce, as the scary and unknown COVID-19 virus sickened and even took the lives of so many people around the world.  Some workers were able to thrive in a remote setting, while others felt isolated and struggled to keep up a balance between their work and home lives. Last year saw the availability of life-saving vaccines, so companies were able to start having the conversation about what to do next. Should they keep everyone remote? Should they go back to working in the office full time? Or should they do something in between? Enter hybrid work, which offers a mix of the two. A Fall 2021 study conducted by Google revealed that over 75% of survey respondents expect hybrid work to become a standard practice within their organization within the next three years.  Thus, two years after the world abruptly shifted to widespread adoption of remote work, we are declaring 20