• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

CISOs Agree That Traditional Application Security Measures Don’t Work

You are here: Home / General Cyber Security News / CISOs Agree That Traditional Application Security Measures Don’t Work
June 4, 2021

Approximately a few-quarters (71%) of CISOs are not self-confident that code in cloud-indigenous architectures is totally free of vulnerabilities prior to it goes into manufacturing, according to new exploration from Dynatrace.

The computer software intelligence organization polled 700 international security chiefs in significant enterprises with around 1,000 workers to greater comprehend their considerations around microservices, containers, and Kubernetes in progress.

Some 89% claimed their use experienced established perilous application security blind spots.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


These challenges show up to be compounded by time-to-market place pressures and present tools and procedures not in good shape-for-goal in the new cloud indigenous era.

Above two-thirds (68%) of CISOs said the sheer quantity of alerts coming via makes it complicated to prioritize. On normal, their groups acquire 2,169 flags about potential application security vulnerabilities each month, most of which are fake positives, the exploration claimed.

Around a quarter (28%) stated enhancement groups at times bypass vulnerability checks to pace up delivery, even though a few-quarters (74%) reported common scanning equipment and other legacy security controls never operate in today’s environments.

Bernd Greifeneder, founder and CTO of Dynatrace, argued that the rising use of cloud-indigenous architectures experienced broken classic ways to application security.

“This study confirms what we’ve very long anticipated: handbook vulnerability scans and impression assessments are no for a longer time equipped to hold up with the tempo of adjust in today’s dynamic cloud environments and quick innovation cycles,” he additional.

“Risk evaluation has develop into approximately impossible owing to the growing variety of interior and exterior provider dependencies, runtime dynamics, constant supply, and polyglot computer software enhancement, which uses an at any time-growing selection of 3rd-party systems. By now stretched teams are pressured to choose in between speed and security, exposing their organizations to unneeded risk.”

Most CISOs questioned for the exploration agreed that extra automation of deployment, configuration and administration was necessary.

“As organizations embrace DevSecOps, they also want to give their teams answers that provide computerized, ongoing, and true-time risk and influence examination for each individual vulnerability, across the two pre-generation and generation environments, and not centered on issue-in-time snapshots,” mentioned Greifeneder.


Some sections of this posting are sourced from:
www.infosecurity-magazine.com

Previous Post: «tiktok implies it’s collecting users' faceprints and voiceprints TikTok implies it’s collecting users’ faceprints and voiceprints
Next Post: China-linked hacking group targeted New York MTA china linked hacking group targeted new york mta»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.