• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
shifting the focus from reactive to proactive, with human led secure

Shifting the focus from reactive to proactive, with human-led secure coding

You are here: Home / General Cyber Security News / Shifting the focus from reactive to proactive, with human-led secure coding
June 7, 2021

The very same 10 software package vulnerabilities have caused much more security breaches in the previous 20+ several years than any many others. And still, a lot of businesses still decide for publish-breach, post-celebration remediation, muddling via the human and business ramifications of it all. But now, a new analysis study factors to a new, human-led way.

‍The next discusses insights derived from a research executed by Secure Code Warrior with Evans Data Corp titled ‘Shifting from response to avoidance: The switching confront of application security’ (2021) exploring developers attitudes in the direction of secure coding, protected code methods, and security functions. Go through the report.

‍‍In the analyze, developers and progress managers ended up questioned about their typical protected coding practices. The prime a few solutions highlighted have been:

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


  • Scanning programs for irregularities or vulnerabilities after they are deployed
  • Scrutinizing write code to examine for irregularities or vulnerabilities
  • The reuse of pre-permitted code that is regarded to be protected

Developers nevertheless view safe code techniques as a reactive observe but bit by bit admit it as a human issue with a aim on commencing left.

So what is this telling us? Two of the prime a few responses are nonetheless concentrated on reactive techniques, the initial dependent on tooling (scanners) and the second on the developer (i.e., human) doing handbook checks – in both equally conditions following the code is prepared. Vulnerabilities detected employing these solutions have to be kicked back to the development group for rework with knock-on outcomes on project timelines and project fees.

Whereas #3 acknowledges the positive aspects of proactively crafting program that is guarded from vulnerabilities in the very first area. This highlights a shift to starting still left – a proactive and preventive technique that bakes security into computer software correct from the start off of the program growth lifecycle.

Reactive equals Highly-priced

According to an IBM analyze*, it is thirty occasions much more highly-priced to resolve vulnerabilities in write-up-launch code than if they had been uncovered and remediated at the commencing. That is a powerful incentive for a new proactive and much more human approach to the protection of computer software security that equips builders to code more securely, proper from the start off.

This is what you could connect with a human-led defense. But to get developers to get started caring about security, it has to become component of the way they consider and code every single day. This is a connect with for new approaches to training that are hyper-pertinent to developers’ day to day perform and inspire them to want to find out – neither of which can be mentioned of recent coaching versions.

To create a proactive security lifestyle, new training is wanted that:

  • will make protected coding a optimistic and participating practical experience for developers as they improve their program security capabilities
  • encourages developers to watch their everyday coding tasks via a security way of thinking
  • can make secure coding intrinsic to their daily workflow

When these threads come collectively, vulnerabilities are prevented from developing in the 1st area, enabling teams to ship quality code faster, with self esteem. Browse the whole report to take a look at the transforming confront of software program security with evaluation and recommendations on how organizations can end repeat vulnerabilities from going on and expertise a optimistic change in security lifestyle in the course of the SDLC. Understand how to:

  • Make sure security is thought of from the commence of the SDLC
  • Take a human-led technique to safe coding
  • Stamp out inadequate coding techniques for fantastic

Get the report now >

Located this post exciting? Observe THN on Fb, Twitter  and LinkedIn to read through extra unique information we article.


Some areas of this posting are sourced from:
thehackernews.com

Previous Post: «researchers discover first known malware targeting windows containers Researchers Discover First Known Malware Targeting Windows Containers
Next Post: New Siloscape malware targets Windows containers and highlights security pitfalls new siloscape malware targets windows containers and highlights security pitfalls»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.