Firms fear software stack breach as attack surface widens

Organizations feel they are vulnerable to multi-tiered cyber attacks that can impact the entire software stack, as they face more challenges with a widening attack surface. As it is, 92% acknowledge making compromises in application security due to the urgency to innovate and respond to changing customer needs during the global pandemic. Also: Phishing attacks are getting scarily sophisticated. All respondents in Singapore admitted the rush to innovate had come at the expense of security during software development, according to a study released by Cisco Systems AppDynamics. The global survey polled 1,150 IT organizations across 13 markets, including Australia, India, Japan, Germany, the UK, and the US, all of which had a turnover of more than $500 million with the exception of Colombia, which included companies with more than $100 million in revenue. Across the board, 78% believed their business was vulnerable to multi-staged security attacks over the next 12 months that could affect their entire software stack. Some 89% said they now had a wider attack surface compared to two years ago, with 46% noting this already was posing more challenges. Some 59% pointed to an increased use of Internet of Things and connected devices as the main reason they now had a wider attack surface, while 56% cited an accelerated cloud adoption and 51% said rapid digital transformation expanded their attack surface. The majority, at 88%, acknowledged more could be done to secure their modern applications across the entire software lifecycle. 81% said insufficient software security skills and resources was proving a challenge for their organization, with 78% noting the lack of a shared vision between their application development and security teams would pose a challenge to software security over the next 12 months. Respondents pointed to various software security challenges they would face this year, including a lack of visibility of attack surfaces and vulnerabilities, protecting sensitive data, and difficulties prioritising threats based on severity and business context. "The widespread adoption of multi-cloud environments and availability of low-code and no-code platforms enable developers to accelerate release velocity and build more dynamic applications across more platforms," Eric Schou, Cisco AppDynamics' vice president and CMO, said in a post. "But with application components increasingly running on a mix of platforms and on-premises databases, this exposes visibility gaps and dramatically increases the risk of a security event." He noted that 68% of respondents said their security tools worked well in silos, but not cohesively, which resulted in an inability to gain a comprehensive view of their organization's security posture. Also: 3 security gadgets I never leave home without. Schou added: "New cybersecurity threats are exposing flaws in traditional approaches to application security and, in particular, the lack of input that security has had into the application development process. In many organizations, there has been little, if any, ongoing collaboration between developer and security teams. They have only engaged when a security issue has arisen, essentially when it is already too late." He noted that more IT departments now were embracing a DevSecOps approach, which helped ensure the integration of application security and compliance testing across the software development lifecycle. "Developers can embed robust security into every line of code, resulting in more secure applications and easier security management before, during, and after release," he said. Some 93% of respondents also believed it was important to contextualize security, so they could correlate risks in relation to other key areas such as software performance, user experience, and business metrics. This would allow them to better prioritize vulnerability fixes based on potential business impact, the study found. In Singapore, 96% said the ability to contextualize security was essential. Another 88% pointed to the adoption of a security framework that encompasses the entire software stack as a priority for their business. Some 81% noted a lack in software security skills and resources was a challenge for their organization, 96% saying their attack surface had widened over the last two years. Another 81% believed they were vulnerable to a multi-staged security attack over the next 12 months. Some 37% in the Asian market said they had taken their first steps in adopting a DevSecOps model, while 58% were considering doing likewise. Across the globe, 76% believed a DevSecOps approach was important to enable companies to effectively protect against multi-staged cyber attacks targeting the software stack. Some 43% had started adopting this application development model, while 46% were considering doing likewise.

This Cyber News was published on www.zdnet.com. Publication date: Wed, 01 Feb 2023 13:38:03 +0000


Cyber News related to Firms fear software stack breach as attack surface widens

7 Best Attack Surface Management Software for 2024 - Attack surface management is a relatively new cybersecurity technology that combines elements of vulnerability management and asset discovery with the automation capabilities of breach and attack simulation and applies them to an organization's ...
6 months ago Esecurityplanet.com
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
1 year ago Trendmicro.com
Law Firms and Legal Departments Get Singled Out For Cyberattacks - Cyberattackers are doubling down on their attacks against law firms and corporate legal departments, moving beyond their historical activity of hacking and leaking secrets to targeting the sector with financial attacks, such as ransomware and ...
7 months ago Darkreading.com
Attack Surface Management: What is it? Why do you need it? - Traditional asset inventory and vulnerability management software can't keep up to date with the growing attack surface and morphing vulnerabilities. Contrary to other cybersecurity software, Attack Surface Management software operates from a ...
6 months ago Securityboulevard.com
How Cybersecurity for Law Firms has Changed - The public nature of the legal system makes law firms particularly vulnerable to a growing number of cybersecurity risks. Law firms have unique access to highly confidential client information and as a result, face a growing number of federal, ...
6 months ago Securityboulevard.com
Firms fear software stack breach as attack surface widens - Organizations feel they are vulnerable to multi-tiered cyber attacks that can impact the entire software stack, as they face more challenges with a widening attack surface. As it is, 92% acknowledge making compromises in application security due to ...
1 year ago Zdnet.com
Law Firms are Raising the Bar on Cybersecurity - Corresponding with recent increases in threat actor activity in the legal industry, law firms are investing more time and attention in modernizing security operations. Both midsize and large law firms are increasingly engaging with cybersecurity ...
1 year ago Bluevoyant.com
Detectify platform enhancements address growing attack surface complexity - Detectify announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies. These updates bring control over attack surface data and enable organizations to seamlessly configure alerts for policy ...
1 month ago Helpnetsecurity.com
A Cybersecurity Risk Assessment Guide for Leaders - Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022's Cyber Risk Index, 85% of the survey's 4,100 global respondents said it's somewhat to very likely they will experience a cyber attack in the next 12 months. ...
1 year ago Trendmicro.com
Limiting Remote Access Exposure in Hybrid Work Environments - Organizations have shifted to remote desktop work environments at an increasing speed since then - simultaneously expanding their attack surface and exposing themselves to greater cybersecurity threats. The remote work revolution has pushed companies ...
7 months ago Securityboulevard.com
Data Breach Response: A Step-by-Step Guide - In today's interconnected world, organizations must be prepared to respond swiftly and effectively in the face of a data breach. To navigate these challenges, a well-defined and comprehensive data breach response plan is essential. Let's explore the ...
4 months ago Securityzap.com
Tech Security Year in Review - In this Tech Security Year in Review for 2023, let's look into the top data breaches of the past year. Each factor contributes to the growing threatscape, demanding a proactive and adaptable cybersecurity approach to safeguard your organization ...
6 months ago Securityboulevard.com
Evolve Bank data breach impacted fintech firms Wise and Affirm - MUST READ. Evolve Bank data breach impacted fintech firms Wise and Affirm. Keytronic confirms data breach after ransomware attack. ABN Amro discloses data breach following an attack on a third-party provider. Christie disclosed a data breach after a ...
2 days ago Securityaffairs.com
Ransomware, Data Breaches Inundate OT & Industrial Sector - Three-quarters of industrial firms suffered a ransomware attack in the past year, with far more compromises affecting operational technology than ever before - representing a surge in attacks driven by both the industrial sector's vulnerability and ...
6 months ago Darkreading.com
A Comprehensive Look at the Financial Firms in European Union and Their Rules on Cloud-Based Services - Today's technology has opened up a world of possibilities for financial firms, especially with cloud-based services. Financial institutions are now able to access a great deal of information over the internet in an efficient and timely manner. ...
1 year ago Tripwire.com
European firms urge China to give more clarity on data transfer laws - AP Moeller - Maersk A/S Siemens AG BEIJING, Nov 15 - European firms "Urgently" need China to give clearer definitions of key terms in its cross-border data transfer rules, a European business lobby group said on Wednesday, warning firms also stood to ...
7 months ago Reuters.com
Infosys McCamish Systems data breach impacted over 6M people - MUST READ. Infosys McCamish Systems data breach impacted over 6 million people. Keytronic confirms data breach after ransomware attack. City of Cleveland still working to fully restore systems impacted by a cyber attack. ABN Amro discloses data ...
5 days ago Securityaffairs.com
Prudential Financial data breach impacted over 2.5M individuals - Prudential Financial data breach impacted over 2.5 million individuals. Keytronic confirms data breach after ransomware attack. ABN Amro discloses data breach following an attack on a third-party provider. Christie disclosed a data breach after a ...
2 days ago Securityaffairs.com
Unraveling the Aftermath of Verizon's Insider Data Breach Impacting 63,000 Employees - In the fast-paced world of digital connectivity, data breaches have become an unfortunate reality that businesses must constantly guard against. Recently, telecommunications giant Verizon found itself in the throes of a security crisis as it grappled ...
4 months ago Cysecurity.news
IONIX ​​Completes $42M Financing Round to Expand Threat Exposure Management Across the Entire Attack Surface - PRESS RELEASE. TEL AVIV, Israel-(BUSINESS WIRE)- IONIX, a leader in Attack Surface Management, today announced it has completed its $42 million A Round financing by securing $15 million in additional funding from new investors Maor Investments along ...
4 months ago Darkreading.com
Welltok data breach exposes data of 8.5 million US patients - Healthcare SaaS provider Welltok is warning that a data breach exposed the personal data of nearly 8.5 million patients in the U.S. after a file transfer program used by the company was hacked in a data theft attack. Welltok works with health service ...
7 months ago Bleepingcomputer.com
What Is Software Piracy? - Software piracy has become a worldwide issue, with China, the United States and India being the top three offenders. In 2022, 6.2% of people worldwide visited software piracy websites. Software piracy doesn't require a hacker or skilled coder. Any ...
6 months ago Pandasecurity.com
Welltok Data Breach: 8.5M US Patients' Information Exposed - In a recent cybersecurity incident, Welltok, a leading healthcare Software as a Service provider, reported unauthorized access to its MOVEit Transfer server, affecting the personal information of approximately 8.5 million patients in the United ...
6 months ago Securityboulevard.com
Ticketmaster confirms data breach impacting 560 million customers - MUST READ. Ticketmaster confirms data breach impacting 560 million customers. ABN Amro discloses data breach following an attack on a third-party provider. Christie disclosed a data breach after a RansomHub attack. OmniVision disclosed a data breach ...
1 month ago Securityaffairs.com
Christie disclosed a data breach after RansomHub attack - MUST READ. Christie disclosed a data breach after a RansomHub attack. OmniVision disclosed a data breach after the 2023 Cactus ransomware attack. City of Wichita disclosed a data breach after the recent ransomware attack. Australian Firstmac Limited ...
1 month ago Securityaffairs.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)