Study: Too many app vulnerabilities get into operation

Study: Too many app vulnerabilities get into operation

For 79 percent of CISOs, continuous runtime vulnerability management is crucial to keep up with the growing complexity of modern multi-cloud environments. […]

The speed and complexity resulting from the use of multi-cloud environments, multiple programming languages and open source software libraries make vulnerability management difficult. This is a key finding of a study of 1,300 Chief Information Security Officers (CISOs) from Dynatrace. According to this, 75 percent of CISOs state that despite multi-layered security precautions, there are gaps that can lead to vulnerabilities in productive operation. This underlines the growing need to combine observability and security. This gives companies a more effective way to manage runtime vulnerabilities and detect and defend against attacks in real time.

Overview of the main results of the study:

  • 69 Percent of CISOs say that vulnerability management has become more difficult due to the greater need to accelerate digital transformation.
  • More than three quarters (79%) of CISOs believe that automatic, continuous runtime vulnerability management is the key to closing the gap in the capabilities of existing security solutions. However, only 4 percent of companies have real-time visibility into runtime vulnerabilities in containerized production environments.
  • Only 25 percent of security teams have real-time access to an accurate, constantly updated report on every application and code library running in production.

“These results underscore the fact that security teams repeatedly overlook vulnerabilities, regardless of how robust their defense mechanisms are,” says Bernd Greifeneder, Chief technology Officer at Dynatrace. “Both new applications and stable legacy software are vulnerable to vulnerabilities that are more reliably detected in production. Log4Shell was the poster child for this problem, and there will no doubt be more such scenarios in the future. Obviously, most companies still lack real-time transparency when it comes to runtime vulnerabilities. The problem arises from the increasing use of cloud-native deployment processes. Although they enable greater business agility, they also bring a new complexity for vulnerability management, attack detection and defense. The rapid pace of digital transformation means that the already overloaded teams are bombarded with thousands of security warnings that make it impossible to focus on the essentials. Teams can’t manually respond to every alert, and companies are exposing themselves to unnecessary risks by allowing vulnerabilities to enter production.“

Further results of the study:

  • On average, companies receive 2,027 alerts about potential security vulnerabilities in applications every month.
  • Less than a third (32%) of the daily incoming alerts about security vulnerabilities in applications require action; compared to 42 percent last year.
  • on average, application security teams waste 28 percent of their time on vulnerability management tasks that could be automated.

“Organizations have realized that security must become a common task in order to effectively manage vulnerabilities in the cloud-native era. The convergence of observability and security is critical to provide the development, operations, and security teams with the context they need to understand how their applications are connected, where the vulnerabilities lie, and which ones need to be prioritized. This speeds up risk management and the response to incidents,“ Greifeneder continues. “To be truly effective, companies should look for solutions that have AI and automation capabilities at their core and enable AISecDevOps. This allows your teams to quickly identify and prioritize runtime vulnerabilities, block attacks in real time, and fix software bugs before they are exploited. So you no longer waste time tracking false positives and potential vulnerabilities that never make it to production. Instead, you can deploy better and more secure software faster.“

NFT Outsourcing Blockchain | Unreal Engine Development

Ready to see us in action:

More To Explore

IWanta.tech
Logo
Enable registration in settings - general
Have any project in mind?

Contact us:

small_c_popup.png