Pegasystems announced the general availability of Pega Infinity ’24.1™.
Companies are struggling to keep up with rapidly evolving threats and the need to automate security efforts. Attacks against web applications have increased in prevalence to become the single biggest cause of data breaches. As the battlefield shifts more and more from the network to the application, it is important to understand how companies are meeting this challenge.
Verizon's 2020 Data Breach Investigation Report found that 43% of breaches could be traced back to attacks against web applications — more than double the results from last year. Equifax is a high-profile example of a web application data breach that exposed the personal information of 147 million people, costing the company $1.38 billion in settlements and security upgrades.
According to Web Application Security — Enterprises are Losing the War, a report prepared by Acunetix and Dimensional Research, 88% of companies now develop web applications in-house.
Half of the respondents have been successful with their shift-left efforts and include web application security scans with every code build or during unit testing. However, that leaves half that don't scan early enough and may incur major time and resource costs to remediate vulnerabilities. Remarkably, half of the respondents said that vulnerabilities are found faster than they can be fixed, meaning their web applications are open to an attack.
"Companies have moved quickly into building their own software, including customer-facing software that contains sensitive data, but have struggled with the challenge of securing those applications," said Mark Ralls, President and CEO of Acunetix.
Nearly 64% of enterprises still burden specialized security personnel with simple web application security testing that could be automated. And less than half of companies empower developers to run security scans on their own code.
"While companies are definitely making the effort to secure their web applications, with half of companies scanning at each code build and 80% scanning all web applications, 36% of the respondents reported using security testing tools that are inadequate for the job," said Ralls. "It's not enough to check the box on web application security, companies need high-quality dynamic security testing solutions to effectively protect themselves and their customers."
Methodology: Security, DevOps, and C-suite professionals from 382 organizations across the globe participated in the survey.
Industry News
Mend.io and Sysdig unveiled a joint solution to help developers, DevOps, and security teams accelerate secure software delivery from development to deployment.
GitLab announced new innovations in GitLab 17 to streamline how organizations build, test, secure, and deploy software.
Kobiton announced the beta release of mobile test management, a new feature within its test automation platform.
Gearset announced its new CI/CD solution, Long Term Projects in Pipelines.
Rafay Systems has extended the capabilities of its enterprise PaaS for modern infrastructure to support graphics processing unit- (GPU-) based workloads.
NodeScript, a free, low-code developer environment for workflow automation and API integration, is released by UBIO.
IBM announced IBM Test Accelerator for Z, a solution designed to revolutionize testing on IBM Z, a tool that expedites the shift-left approach, fostering smooth collaboration between z/OS developers and testers.
StreamNative launched Ursa, a Kafka-compatible data streaming engine built on top of lakehouse storage.
GitKraken acquired code health innovator, CodeSee.
ServiceNow introduced a new no‑code development studio and new automation capabilities to accelerate and scale digital transformation across the enterprise.
Security Innovation has added new skills assessments to its Base Camp training platform for software security training.
CAST introduced CAST Highlight Extensions Marketplace — an integrated marketplace for the software intelligence product where users can effortlessly browse and download a diverse range of extensions and plugins.
Red Hat and Elastic announced an expanded collaboration to deliver next-generation search experiences supporting retrieval augmented generation (RAG) patterns using Elasticsearch as a preferred vector database solution integrated on Red Hat OpenShift AI.
Traceable AI announced an Early Access Program for its new Generative AI API Security capabilities.