Software code is regularly released before security testing new survey finds

New survey data reveals that although majority of respondents feel as though their software and applications are secure, many lack the proactive, layered security programmes necessary to combat today’s vulnerabilities.

Results from Veracode’s survey of 500 IT decision makers working in cybersecurity, revealed that 83% of respondents have released code before testing or resolving security issues for bugs.

Additional findings show that while the majority believe their organisation’s software and applications are secure, nearly half (44%) have still spent more than a million dollars on bug bounty programmes to catch vulnerabilities.

Proactive, automated vulnerability detection and remediation is now more important than ever. Further proven in that today’s threat landscape web application attacks continue to be the number one source of data breaches, end-user organisations are on the hunt to alleviate these potentially catastrophic challenges.

The survey shows that 1 in 3 (36%) have turned to bug bounty programmes, growing in popularity, these types of programmes have even caught the eye of notable technology giants such as Apple, Google and Yelp, all of whom have jumped on the widely-publicised bandwagon, and announced their own programmes.

Bug bounty programmes: a quick-fix solution?

Although bug bounty programmes can be effective, relying on a reactive approach to vulnerability detection is simply not enough. Since bug bounty programmes focus on applications in use, they merely expose risks that the users of that application have been exposed to for months or even years.

Veracode’s survey data shows that 77% of professionals admit to relying too heavily on programmes intended to catch mistakes in code that should have been proactively identified.

Furthermore, 93% believe most flaws uncovered in a bug bounty programme could have been prevented by developer training or testing in the development phase. As such, organisations need a strategic, more cost-effective approach, balancing between proactive and reactive measures to effectively combat the changing threat landscape, an approach that begins at the application layer.

“In today’s technology environment, application security testing for vulnerabilities and flaws in software code should be a security best practice, regardless of an organisation’s size or industry,” said Chris Wysopal, co-founder and CTO, Veracode. “While bug bounty programmes catch flaws that inadvertently slipped through the software layer cracks, this reactive approach will not solve the bigger issue at stake which is helping eliminate security-related defects before the software is put into use. Our survey data is a signal to the security and researcher community that businesses need help in their software security strategy; it’s our responsibility as experts to assist in better securing software before it’s too late.”

Patching the problem

In short, cyber-attacks at the application layer are all too common and organisations cannot rely on a singular security solution. Thankfully, many organisations are taking the right steps to better achieve a steady balance between proactive and reactive security strategies to remediate vulnerabilities. Although respondents still find value in a bug bounty programme, larger groups find value in a layered application security approach:

  • 81% of respondents have implemented an application security programme to find and fix vulnerabilities in their software and protect applications from external threats
  • More than 3 in 4 (79%) of those surveyed feel that effectively deployed application security programmes result in spending less on costly bug bounty programmes
  • 59% find that it’s more expensive to fix code flaws found in bug bounty programmes versus securing code during the development cycle

 

Edited from press release by Cecilia Rehn.

More
articles