Research reveals 80% of applications developed in EMEA contain security flaws – IT Security Guru

Research reveals 80% of applications developed in EMEA contain security flaws – IT Security Guru>
– The Gurus
Research released recently has revealed that 80 percent of applications developed in the Europe, Middle East and Africa (EMEA) region contain high-risk security flaws, putting organizations at risk of data breaches and many other cyber threats.
The research, conducted by Synopsys, an American cyber security company, studied more than 8,000 applications in the EMEA region and found that almost four out of every five of them had vulnerabilities that could lead to high-risk threats being realized.
One of the key findings was that applications with APIs were particularly vulnerable, with almost 83 percent of the applications studied having severe flaws related to authentication and authorization.
Additionally, the research found that more than one in four applications had a critical attribute missing from their API.
The research indicates that organizations’ existing security practices, such as manual code review and static analysis, are not being effective in reducing the number of application security flaws present in their systems.
It further reveals that it’s necessary for organizations to shift their focus to identifying potential vulnerabilities during the design and architecture phases of development, as well as implementing stricter testing protocols to ensure flaws are identified quickly.
Overall, the research serves as an important reminder for organizations in the EMEA region to ensure they are taking the necessary steps to ensure the security of their applications.
Organizations need to make sure they are using secure coding practices during the development process, as well as utilizing automated application vulnerability scans to quickly identify flaws and patch them accordingly.
Link: https://www.itsecurityguru.org/2023/09/27/research-reveals-80-of-applications-developed-in-emea-contain-security-flaws/


Categories:

Tags: