SmartBear announced its acquisition of QMetry, provider of an AI-enabled digital quality platform designed to scale software quality.
The benefits of shifting left in development are clear and well-known. Integrating security into the development process early on is a good idea. Ideally, effectively shifting left allows organizations to significantly lower their risk profile, which is a big part of why DevSecOps has become such a buzzword. Nevertheless, shifting left is not a silver bullet for cybersecurity.
The problem is this: the notion of shifting left is dependent on a linear development process, but real-life development is anything but linear. Companies are assembling increasingly complex tech stacks, and more and more stakeholders have the ability to stand up servers or provision apps, often without even alerting the security team. There isn't an organization on the planet that runs every piece of code past their security team, no matter how much they've emphasized "shifting left."
The current world of software relies heavily on recycled code, much of which is lifted from open-source repositories. No matter how tightly you integrate security into your development cycles, if the open-source code you borrowed is vulnerable, so are you. Even if you were to somehow achieve the unrealistic goal of "zero vulnerabilities in production," there's no guarantee that this will actually make your business secure.
Patch Management Doesn't Cover the Bases
Another issue companies face beyond just shifting their security left is the heavy reliance on patch management to find and fix vulnerabilities. While patch management certainly has its uses, there are a few notable shortcomings. Of 344 unique vulnerabilities ransomware operators exploited in 2021, 76% of the flaws were from 2019 or before. Not much has changed. When Equifax was breached in 2017, hackers exploited a vulnerability that had been reported months ago.
Even when done well, patch management is reactive and not completely effective. Somebody has to first find a vulnerability and then create a patch for it. Sometimes ethical hackers follow industry guidelines, but companies sometimes fail to patch the vulnerability quickly enough. It takes bad actors roughly a fortnight to turn a vulnerability into an exploit. If you don't move quicker than that to remediate a known vulnerability, you are leaving the door wide open for an attacker.
Have a Better Plan: Enable Proactive Security
Not everything that ends up in the production environment can be tested in development. Planning to catch vulnerabilities through shifting left or reactive patch management is a plan that will fail. Patch management and shifting left don't mean much if you can't move quickly to address the vulns you do find. You won't catch everything, and you won't patch what you do catch quickly enough.
Our increasing reliance on recycled code and the lack of visibility into unused or forgotten assets leave companies with more blind spots than ever. In the face of this ever-evolving digital landscape, companies cannot assume that their expanding external attack surface is protected just because they've introduced security into the development process — in fact, they should assume the opposite. It's not enough to shift left and supplement with patch management. Instead, companies should look to the right and consider how to continuously manage their expanding external attack surface in real-time.
Organizations need to transition from reactively chasing down vulns to holistically managing risk across their entire attack surface. Continuously testing the entire external attack surface, identifying forgotten assets and testing in a way that mimics how an attacker might exploit them is the only scalable form of defense. While it would be nice to catch all the vulnerabilities in development, that's unrealistic. Healthy cybersecurity begins with being proactive, thinking about what's next, and having a reliable plan in place.
Industry News
Red Hat signed a strategic collaboration agreement (SCA) with Amazon Web Services (AWS) to scale availability of Red Hat open source solutions in AWS Marketplace, building upon the two companies’ long-standing relationship.
CloudZero announced the launch of CloudZero Intelligence — an AI system powering CloudZero Advisor, a free, publicly available tool that uses conversational AI to help businesses accurately predict and optimize the cost of cloud infrastructure.
Opsera has been accepted into the Amazon Web Services (AWS) Independent Software Vendor (ISV) Accelerate Program, a co-sell program for AWS Partners that provides software solutions that run on or integrate with AWS.
Spectro Cloud is a launch partner for the new Amazon EKS Hybrid Nodes feature debuting at AWS re:Invent 2024.
Couchbase unveiled Capella AI Services to help enterprises address the growing data challenges of AI development and deployment and streamline how they build secure agentic AI applications at scale.
Veracode announced innovations to help developers build secure-by-design software, and security teams reduce risk across their code-to-cloud ecosystem.
Traefik Labs unveiled the Traefik AI Gateway, a centralized cloud-native egress gateway for managing and securing internal applications with external AI services like Large Language Models (LLMs).
Generally available to all customers today, Sumo Logic Mo Copilot, an AI Copilot for DevSecOps, will empower the entire team and drastically reduce response times for critical applications.
iTMethods announced a strategic partnership with CircleCI, a continuous integration and delivery (CI/CD) platform. Together, they will deliver a seamless, end-to-end solution for optimizing software development and delivery processes.
Progress announced the Q4 2024 release of its award-winning Progress® Telerik® and Progress® Kendo UI® component libraries.
Check Point® Software Technologies Ltd. has been recognized as a Leader and Fast Mover in the latest GigaOm Radar Report for Cloud-Native Application Protection Platforms (CNAPPs).
Spectro Cloud, provider of the award-winning Palette Edge™ Kubernetes management platform, announced a new integrated edge in a box solution featuring the Hewlett Packard Enterprise (HPE) ProLiant DL145 Gen11 server to help organizations deploy, secure, and manage demanding applications for diverse edge locations.
Red Hat announced the availability of Red Hat JBoss Enterprise Application Platform (JBoss EAP) 8 on Microsoft Azure.
Launchable by CloudBees is now available on AWS Marketplace, a digital catalog with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS).