Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 29 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Retailers Acting Quickly To Fix Flaws In Software But Code Quality Issues Remain Rampant.

by The Gurus
November 19, 2018
in Software
Share on FacebookShare on Twitter

Veracode’s latest State of Software Security report (SoSS) revealed retail is faster than most industries when it comes to addressing common vulnerabilities found in software. The global report found retail is second only to healthcare in its speed of shutting down flaws, which reduces risk exposure.

However, two-thirds (66%) of current applications used by retailers are at risk from information leakage attacks, in which an application reveals sensitive data that can be used by an attacker to exploit the target web application, its hosting network, or its users. The retail sector reported the third-most information leakage issues behind the technology and financial services industries.

Veracode’s report also investigated flaw persistence, or how long a flaw lingers after first being discovered. The report showed healthcare and retail are reducing their risk the fastest, with the retail sector remediating a quarter of vulnerabilities in 14 days and 50 percent of flaws in 64 days. In fact, retail outpace the average speed of fix at every interval across all industries, meaning the sector remains consistent with its urgency in closing vulnerabilities.

Even as it is making strides reducing risk, retail recorded the highest amount of code quality flaws of all other verticals at 65 percent. Code quality is the third most common vulnerability category in all industries, following information leakage and cryptographic issues, suggesting this is an industry-wide dilemma with developing quality code.

“In the wake of GDPR, it’s vital that retailers have visibility into risk associated with code flaws,” said Paul Farrington, Director of EMEA and APJ at Veracode. “With the busy holiday shopping season arriving, vulnerabilities in applications can allow attackers seeking sensitive information such as consumer payment data a way in. Many retailers are showing an aptitude for remediating flaws quickly to help improve security and protect their high value information. This is promising, yet the persistence and prevalence of vulnerabilities that continues to plague retailers calls for both increased speed of fix and better prioritising which flaws to fix first.”

About Veracode
Veracode is a leader in helping organisations secure the software that powers their world. Veracode’s SaaS platform and integrated solutions help security teams and software developers find and fix security-related defects at all points in the software development lifecycle, before they can be exploited by hackers. Our complete set of offerings help customers reduce the risk of data breaches, increase the speed of secure software delivery, meet compliance requirements, and cost effectively secure their software assets- whether that’s software they make, buy or sell.

Veracode serves over 2,000 customers across a wide range of industries, including nearly one-third of the Fortune 100, three of the top four U.S. commercial banks and more than 20 of Forbes’ 100 Most Valuable Brands. Learn more at www.veracode.com, on the Veracode blog, on Twitter and in the CA Veracode Community.

Legal notice
Copyright © 2017 Veracode, Inc. All rights reserved. All other brand names, product names, or trademarks belong to their respective holders.

[tpr-boilerplate company=’null’]

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

DigiCert Selected By USB-IF To Operate Managed PKI For USB Type-C™ Authentication.

Next Post

80% Of European Magento Websites At Risk From Hackers Due To Simple Security Oversight.

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information