• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

CISOs Agree That Traditional Application Security Measures Don’t Work

You are here: Home / General Cyber Security News / CISOs Agree That Traditional Application Security Measures Don’t Work
June 4, 2021

Approximately a few-quarters (71%) of CISOs are not self-confident that code in cloud-indigenous architectures is totally free of vulnerabilities prior to it goes into manufacturing, according to new exploration from Dynatrace.

The computer software intelligence organization polled 700 international security chiefs in significant enterprises with around 1,000 workers to greater comprehend their considerations around microservices, containers, and Kubernetes in progress.

Some 89% claimed their use experienced established perilous application security blind spots.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


These challenges show up to be compounded by time-to-market place pressures and present tools and procedures not in good shape-for-goal in the new cloud indigenous era.

Above two-thirds (68%) of CISOs said the sheer quantity of alerts coming via makes it complicated to prioritize. On normal, their groups acquire 2,169 flags about potential application security vulnerabilities each month, most of which are fake positives, the exploration claimed.

Around a quarter (28%) stated enhancement groups at times bypass vulnerability checks to pace up delivery, even though a few-quarters (74%) reported common scanning equipment and other legacy security controls never operate in today’s environments.

Bernd Greifeneder, founder and CTO of Dynatrace, argued that the rising use of cloud-indigenous architectures experienced broken classic ways to application security.

“This study confirms what we’ve very long anticipated: handbook vulnerability scans and impression assessments are no for a longer time equipped to hold up with the tempo of adjust in today’s dynamic cloud environments and quick innovation cycles,” he additional.

“Risk evaluation has develop into approximately impossible owing to the growing variety of interior and exterior provider dependencies, runtime dynamics, constant supply, and polyglot computer software enhancement, which uses an at any time-growing selection of 3rd-party systems. By now stretched teams are pressured to choose in between speed and security, exposing their organizations to unneeded risk.”

Most CISOs questioned for the exploration agreed that extra automation of deployment, configuration and administration was necessary.

“As organizations embrace DevSecOps, they also want to give their teams answers that provide computerized, ongoing, and true-time risk and influence examination for each individual vulnerability, across the two pre-generation and generation environments, and not centered on issue-in-time snapshots,” mentioned Greifeneder.


Some sections of this posting are sourced from:
www.infosecurity-magazine.com

Previous Post: «tiktok implies it’s collecting users' faceprints and voiceprints TikTok implies it’s collecting users’ faceprints and voiceprints
Next Post: China-linked hacking group targeted New York MTA china linked hacking group targeted new york mta»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.