Only 11% of Information Security Managers Trust Security Level of Their Applications

Application vulnerabilities are a major factor in the cyber-crime game. The objectives of Quotium’s research published today was to better understand the solutions used to secure applications in leading corporates in Europe and in the United States. More than 500 CISOs and Security managers have been interviewed about the security state of their applications, the frequency of attacks in their organizations and the solutions in place to mitigate these security threats.

The first fact that arises from the study is that most of the big organizations interviewed currently have processes in place to test their web applications vulnerabilities. Most of them use penetration testing services, automated testing tools – mostly applications scanners or static code analyzers – or web application firewalls to secure their assets.

However, a majority of security managers are unsure of the current level of their application security state and do believe that a hacker could manage to exploit their applications. Also almost half do not have a clear view on the attacks currently performed against their organization.

One of the most interesting findings of this study is the gap between the efforts put into protecting applications and the actual state of the applications. While almost all organizations invest time, money and energy into protecting their infrastructure, using one or more types of service or technology, most applications remain vulnerable and are still being attacked.

The research and linked Infographic can be found at this address: http://www.quotium.com/research/State_of_application_security_Infographic.php

Like this article?

Share on X
Share on Linkedin
Share on Facebook
Share via email

Other posts that might be of interest

Social

How to succeed with social networking

Social networkers love things like Facebook and MySpace, but as this discussion in Facebook shows people are getting frustrated with so many different social networking systems. If you want to network properly you have to

Read More »

Who you link to is important online

People who have “dubious” friends are often avoided. Think about some people you know whose contacts you are not “too sure” about. There’s something about these people that’s not quite right. You can’t put your

Read More »

BBC Radio Tees interviews me

Just spent half an hour live on air in the mid morning programme on BBC Radio Tees talking about social networking. Great programme and interesting chat with Alex Hall about the future of social networking

Read More »