Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/26/2009
09:24 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Firms Taking Web App Security (More) Seriously

Anyone in IT, who hasn't been living under a hard drive for the past decade, knows that poor application development processes have littered the Internet and corporate networks alike with trashy code that makes systems too susceptible to attack. Some companies, according to a new survey, are taking quality code more seriously.

Anyone in IT, who hasn't been living under a hard drive for the past decade, knows that poor application development processes have littered the Internet and corporate networks alike with trashy code that makes systems too susceptible to attack. Some companies, according to a new survey, are taking quality code more seriously.It took a relentless series of Internet worms and embarrassing software vulnerabilities -- more than seven years ago -- to get Microsoft to finally put significant resources behind the development of more secure, sustainable applications.

It seems it takes a publicly disclosed data breach for firms to spend more on data security in the application development phase -- than those that haven't suffered such a breach. At least, that's the finding of a new survey (PDF) conducted by the Open Web Application Security Project, ran by the OWASP Foundation.

I guess it's human nature to only want to cut back on the salt and red meat -- after one has been diagnosed with hypertension. Or take vitamins and drink more fresh juice after being sick.

And that's reflected in the findings of this survey, of about 50 companies: enterprises that were publically breached spend more to develop secure code than those that have not been breached. Or, at least those that weren't required, by the threat of a big regulatory hammer, to publicly disclose the breach.

This shows than any evangelists within organizations fighting to improve the security of applications before they're shipped, or deployed, are fighting an uphill battle against human nature. That is: why fix or focus on something that isn't broken, or causing problems today?

Problem is this: more often than not, software is shipped, or sent onto production Web servers, when it's broken. And by broken, I mean loose enough to enable someone sitting in a café in Kazakhstan to pwn the app, and then most probably the server.

The challenge is people can't see broken, or shoddily written software. At least not if it runs without crashing (too often), they can't see the holes (buffer overflows, etc.) that make the application a sieve to attack.

The good news in the survey is that 61 percent of those surveyed report that they have independent third-parties review their Web application code before it goes to production.

That percentage, based on my own reporting and interviews, strikes me as way high. But it is a survey of only about 50 companies.

In any event, it's good news. And shows some steps in the right direction. With the daily grind of data breaches and software vulnerability announcements -- I'll take it.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.