As a result of the worldwide pandemic, technology companies were forced to pivot to fully remote operations. For many organizations, this meant accelerating their digital transformation efforts.
But despite the investment in digital transformation efforts, there haven’t been enough investments in security measures. Our recent State of Software Security v11 (SOSS) report found that, when compared to other industries, the technology industry has the second-highest proportion of applications with security flaws and the highest proportion of applications with high-severity flaws. 
Given that the pandemic has incited an increase in cyberattacks, now is not the time to have vulnerable applications. Luckily, the technology industry is efficient when it comes to fixing flaws and managing its security debt. 

360 Mobile Vision - North & South Carolina Security products and Systems Installations for Commercial and Residential - $55 Hourly Rate. ACCESS CONTROL, INTRUSION ALARM, ACCESS CONTROLLED GATES, INTERCOMS AND CCTV INSTALL OR REPAIR 360 Mobile Vision - is committed to excellence in every aspect of our business. We uphold a standard of integrity bound by fairness, honesty and personal responsibility. Our distinction is the quality of service we bring to our customers. Accurate knowledge of our trade combined with ability is what makes us true professionals. Above all, we are watchful of our customers interests, and make their concerns the basis of our business.

If technology companies are looking to become even more efficient at fixing flaws and managing security debt, they should look at the nature of their applications and see if there are any attributes that can be improved through nurture. For example, our SOSS research uncovered that many technology applications are large and dated. Although those attributes can’t be easily changed, increasing scan cadence could have a very positive effect on application security health. In fact, the report found that a steady scan cadence can improve time to remediation by approximately 14 days.
But fix rate and time to remediation shouldn’t be the only concerns. It’s also crucial that technology organizations know what types of flaws are the most prevalent so that they can take proactive steps to prevent these flaws.
For technology, information leakage and cryptography issues seem to be the most rampant. This is likely due to the fact that technology companies collect and handle sensitive information. Our Software Security Flaw Heat Map gives tips for avoiding these flaws.

But what else should the technology sector know about its application security health, and what other step can companies take to prevent a breach?
For more information on software security trends in the technology industry, check out The State of Software Security Industry Snapshot.

By admin