Progress announced new powerful capabilities and enhancements in the latest release of Progress® Sitefinity®.
Managing and securing your software supply chain is vital to delivering reliable, trusted releases in today's software world. With the constant growth of open-source components, assessing your organization's ability to manage them is crucial.
To help you prepare, JFrog compiled a report that combines the company's usage data, CVE analysis conducted by the JFrog Security Research Team, and commissioned third-party polling data from 1,224 professionals in security, development, and operations roles. Below is an overview of some key findings that we discovered.
Four of the report's most crucial themes include:
■ The software supply chain is growing rapidly: The open-source ecosystem is quickly expanding, leading to a vast software supply chain.
■ Understanding risk is key. Not all reported vulnerabilities require immediate attention, so focusing on where the real risks lie is essential.
■ Where security efforts should be focused: There's a growing awareness of security, but disjointed approaches cost development teams approximately a quarter of their monthly working time.
■ The impact of AI and ML: Organizations must be deliberate about leveraging AI-based tools and quickly adopt security best practices for model use.
The rapid expansion of tools, technologies, and programming languages in today's landscape presents a significant challenge for organizations and could place considerable pressure on their operations.
According to the report:
How many programming languages do you use in your software development organization? (Commissioned survey, 2023)
Over half of organizations (53%) utilize four to nine programming languages, while 31% use more than 10 languages. Predictably, the larger the organization, the more programming languages are likely used.
And while there are dozens of programming languages and packaging technologies to choose from when building production-ready applications, JFrog data shows that traditional, tried and true technologies are still the most popular — npm (Javascript), Maven (Java), Docker, PyPI (Python), Go, Nuget (.NET), and Conan (C/C++).
Number of new packages per year, displayed by package type (JFrog Catalog data, 2023)
For their chosen technologies, organizations have to sift through more and more open source packages to find the ones best suited for their projects. Docker and npm are the package types that have contributed the most by far. PyPI's contribution is also on the rise, likely driven by AI/ML use cases.
The variety of available open-source packages and libraries is thriving, but as the report explores, it inadvertently creates a world of potential risk for organizations. In 2023, over 26,000 new CVEs (Common Vulnerabilities and Exposures) were introduced to the open source ecosystem, continuing the upward trend YoY.
CVEs by month and severity in the last 2 years (National Vulnerability Database analyzed by JFrog Security Research)
An examination of CVEs recorded in the National Vulnerability Database from January 2022 to November 2023 reveals the consistent presence of Critical and Low CVEs, while medium and High CVEs show a notable upward trend. While this trend may raise concerns, an analysis of more than 200 high-profile CVEs in 2023 conducted by the JFrog Security Research team presents a contrasting narrative. The JFrog Security Research Team downgraded 85% of Critical CVEs and 73% of High CVEs it examined.
Vulnerabilities in Open Source components aren't the only source of risk organizations must manage. Human error also creates risk and has been the cause of some of the biggest security events of the past year. Take, for example, exposed secrets (ie. tokens) accidentally left in code. After examining common open-source software registries, including npm, PyPI, RubyGems, crates.io and DockerHub, the JFrog Security Research Team identified over 15,000 tokens. This is less than compared to 2022, but still an alarming number.
Organizations have a varied approach to tackling risk in their software supply chain — from where they scan and the different tools that they use. A third of respondents indicated their organization uses 10 or more application security tools, with nearly half using 4-9. The challenge is that security activities are taking up a significant amount of time — roughly 4 working days in a given month — that could be used to deliver new value to customers.
Looking forward, there will always be risk in software development and the growing complexity of the software supply chain will only make it more difficult to manage. However, with the right tools and practices, organizations can continue to drive software innovation and ensure that trusted, quality software is released to customers.
Industry News
Red Hat announced the general availability of Red Hat Enterprise Linux 9.5, the latest version of the enterprise Linux platform.
Securiti announced a new solution - Security for AI Copilots in SaaS apps.
Spectro Cloud completed a $75 million Series C funding round led by Growth Equity at Goldman Sachs Alternatives with participation from existing Spectro Cloud investors.
The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, has announced significant momentum around cloud native training and certifications with the addition of three new project-centric certifications and a series of new Platform Engineering-specific certifications:
Red Hat announced the latest version of Red Hat OpenShift AI, its artificial intelligence (AI) and machine learning (ML) platform built on Red Hat OpenShift that enables enterprises to create and deliver AI-enabled applications at scale across the hybrid cloud.
Salesforce announced agentic lifecycle management tools to automate Agentforce testing, prototype agents in secure Sandbox environments, and transparently manage usage at scale.
OpenText™ unveiled Cloud Editions (CE) 24.4, presenting a suite of transformative advancements in Business Cloud, AI, and Technology to empower the future of AI-driven knowledge work.
Red Hat announced new capabilities and enhancements for Red Hat Developer Hub, Red Hat’s enterprise-grade developer portal based on the Backstage project.
Pegasystems announced the availability of new AI-driven legacy discovery capabilities in Pega GenAI Blueprint™ to accelerate the daunting task of modernizing legacy systems that hold organizations back.
Tricentis launched enhanced cloud capabilities for its flagship solution, Tricentis Tosca, bringing enterprise-ready end-to-end test automation to the cloud.
Rafay Systems announced new platform advancements that help enterprises and GPU cloud providers deliver developer-friendly consumption workflows for GPU infrastructure.
Apiiro introduced Code-to-Runtime, a new capability using Apiiro’s deep code analysis (DCA) technology to map software architecture and trace all types of software components including APIs, open source software (OSS), and containers to code owners while enriching it with business impact.
Zesty announced the launch of Kompass, its automated Kubernetes optimization platform.
MacStadium announced the launch of Orka Engine, the latest addition to its Orka product line.