Skip to Content Facebook Feature Image

As Developers Struggle to Prioritize Security Debt, Veracode Announces Latest Innovations to Identify and Unify Critical Risk

News

As Developers Struggle to Prioritize Security Debt, Veracode Announces Latest Innovations to Identify and Unify Critical Risk
News

News

As Developers Struggle to Prioritize Security Debt, Veracode Announces Latest Innovations to Identify and Unify Critical Risk

2024-08-01 19:56 Last Updated At:20:01

LAS VEGAS--(BUSINESS WIRE)--Aug 1, 2024--

Black Hat USA Conference (booth #2536) –Veracode, a global leader in application risk management, today announced platform innovations to help organizations uncover, prioritize, and reduce security debt across their growing attack surface. Universal Connector and Application Security Heatmap, the two newest capabilities from Longbow powered by Veracode, allow organizations to quickly connect findings from any source and see the applications that are contributing to the most risk. Together, the Universal Connector and the Application Security Heatmap provide clear, operational insight into assets and issues, allowing remediation actions to be prioritized by quantifiable risk.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20240801020287/en/

“The combination of mounting security debt, an expanding attack surface made more vulnerable by generative AI, and an overwhelming volume of security alerts makes it challenging for organizations to know which application risks to prioritize,” said Chris Eng, Chief Research Officer at Veracode. “In fact, our State of Software Security research shows that many organizations are more focused on remediating low-severity flaws than critical flaws. Security leaders need technology that enables them to effectively uncover and manage application risk, and then reduce that risk by focusing on the issues that matter most across their entire attack surface.”

Prioritization of Security Debt: Critical vs Non-critical

In its State of Software Security 2024 Language Snapshot, Veracode revealed the varying prevalence of “critical” and “non-critical” security debt among applications written in different languages. Critical security debt is defined for this report as high-severity flaws that remain unfixed for longer than a year. If exploited, these flaws would put the integrity and availability of organizations at serious risk.

The research found that while most security debt exists in first-party code written by in-house developers, the most critical security debt resides in third-party code (e.g., open-source software imported into the codebase). For example, 80 percent of critical debt in Java apps, and 63 percent in JavaScript apps, is in third-party code. The report also found about 51 percent of critical flaws in Java apps turn into security debt, while only about 45 percent of low to medium flaws progress into security debt.

Eng said, “With the overflowing volume of security flaws, developers are not prioritizing those that present the most risk. While focusing on non-critical flaws may result in some quick fixes, developers should use their limited capacity to work on fixing critical flaws with the highest potential impact on security.”

Putting Visibility and Prioritization First: Universal Connector & Application Security Heatmap

Building on Veracode’s acquisition of Longbow Security in April this year, and the introduction of Longbow’s Repo Risk Visibility and Analysis capability in May, Universal Connector and Application Security Heatmap are designed with developers’ time in mind. The capabilities provide operational oversight to help developers and security teams quickly identify and prioritize the most important fixes for growing security debt across their applications.

Universal Connector allows organizations to quickly access disparate source data they otherwise couldn’t bring into the Longbow platform, meaning they don’t have to wait for a tool-specific connector. The Application Security Heatmap maps the application back to the owner and shows a 90-day risk trend, as well as enabling customization of the risk threshold to meet organizational policy. Application security teams and developers can analyze each application, view the distribution of risk, and implement recommendations for the Best Next Action™ to remediate that risk.

“As organizations seek to find and fix mounting critical security debt, the need for risk-focused visibility and prioritization is clear,” said Derek Maki, Vice President of Product Management at Veracode. “The new capabilities in the Longbow platform provide our customers with a deeper understanding of an organization’s riskiest applications, plus the unique ability to identify the top five most impactful solutions for improvement.”

Enhanced by the Longbow acquisition, Veracode closes the gap between development and security teams, delivering visibility from code repositories to cloud assets and runtime. Longbow also identifies infrastructure-as-code and misconfiguration risk for cloud assets originating from repositories.

The Longbow Universal Connector and Application Security Heatmap are available immediately. For more information, please visit the website or watch the interview with Brian Roche, Veracode Chief Executive Officer, and Derek Maki.

The full State of Software Security 2024 Language Snapshot is available on the Veracode website.

Visitors to the Black Hat USA Conference, August 3-8, 2024, can learn more about Veracode’s platform and these new features by visiting Veracode’s booth #2536 for a demo.

About the State of Software Security Report

The Veracode State of Software Security 2024 report analyzed data from large and small companies, commercial software suppliers, software outsourcers, and open-source projects. The research draws from more than a million (1,007,133) applications across all scan types, 1,553,022 dynamic analysis scans, and 11,429,365 static analysis scans. All those scans produced 96 million raw static findings, 4 million raw dynamic findings, and 12.2 million raw software composition analysis findings.

About Veracode

Veracode is a global leader in Application Risk Management for the AI era. Powered by trillions of lines of code scans and a proprietary AI-assisted remediation engine, the Veracode platform is trusted by organizations worldwide to build and maintain secure software from code creation to cloud deployment. Thousands of the world’s leading development and security teams use Veracode every second of every day to get accurate, actionable visibility of exploitable risk, achieve real-time vulnerability remediation, and reduce their security debt at scale. Veracode is a multi-award-winning company offering capabilities to secure the entire software development life cycle, including Veracode Fix, Static Analysis, Dynamic Analysis, Software Composition Analysis, Container Security, Application Security Posture Management, and Penetration Testing.

Learn more at www.veracode.com, on the Veracode blog, and on LinkedIn and X.

Copyright © 2024 Veracode, Inc. All rights reserved. Veracode is a registered trademark of Veracode, Inc. in the United States and may be registered in certain other jurisdictions. All other product names, brands or logos belong to their respective holders. All other trademarks cited herein are property of their respective owners.

Figure 2: Flaws in Java Applications That Become Critical and Non-critical Security Debt, State of Software Security Report 2024 (Graphic: Business Wire)

Figure 2: Flaws in Java Applications That Become Critical and Non-critical Security Debt, State of Software Security Report 2024 (Graphic: Business Wire)

Figure 1: State of Software Security 2024 Language Snapshot (Graphic: Business Wire)

Figure 1: State of Software Security 2024 Language Snapshot (Graphic: Business Wire)

UNITED NATIONS (AP) — Weaponizing ordinary communication devices represents a new development in warfare, and targeting thousands of Lebanese people using pagers, two-way radios and electronic equipment without their knowledge is a violation of international human rights law, the United Nations human rights chief said Friday.

Volker Türk told an emergency meeting of the U.N. Security Council there must be an independent and transparent investigation of the two attacks in Lebanon on Tuesday and Wednesday where these devices exploded, reportedly killing 37 people and injuring more than 3,400 others.

“Those who ordered and carried out these attacks must be held to account,” he said.

Lebanon has blamed Israel for the attacks, which appeared to target Hezbollah militants but also saw many civilian casualties, including children. Hezbollah has fought many conflicts with Israel, including a war in 2006, and it has conducted near-daily strikes against Israel to support Hamas militants who attacked Israel on Oct. 7.

Before the council meeting, Israel’s U.N. Ambassador Danny Danon was asked by reporters about speculation Israel was behind the two explosions.

“We are not commenting on the specific attacks you mentioned, but I can tell you that we will do everything we can to target those terrorists to minimize casualties for civilians,” he replied.

Lebanon’s Foreign Minister Abdallah Bouhabib accused Israel of terrorizing the entire Lebanese population on streets, in markets, shops and their homes where their communications devices exploded.

He held up a photo of a mangled and bloodied hand, telling ambassadors from the 15 council nations: “Look at the ugliness of what has happened in this picture.”

Bouhabib insisted that Israel not only launched the attacks but told the council there were “official declarations” and a tweet by an adviser to Prime Minister Benjamin Netanyahu “that was lately deleted, emphasizing the responsibility of Israel and praising the positive results of this assault.”

He appeared to be referring to a deleted tweet by Netanyahu adviser Topaz Luke, who reportedly retweeted a post that included a reply indicating that Israel was behind the attacks in Lebanon and neighboring Syria.

Israel’s Danon criticized the Lebanese minister for never mentioning Hezbollah and said the Lebanese people are “trapped in the grip of this terrorist organization.”

Lebanon’s Bouhabib warned the council that if it doesn’t condemn the week’s deadly explosions and name Israel as the perpetrator, a “Pandora’s Box” will be opened, and governments and extremists will target, terrorize and kill civilians with similar communications devices on trains, planes and elsewhere.

Türk, the U.N. high commissioner for human rights, said the explosions not only violated international human rights law but also appear to violate international humanitarian law’s key principles in carrying out attacks: distinction between civilians and combatants, proportionality, and precautions.

International law also prohibits the use of booby-trap devices that look harmless, he said, and “it is a war crime to commit violence intended to spread terror among civilians.”

“Let me be clear — this method of warfare may be new and unfamiliar,” Türk said, “but international humanitarian and human rights law apply regardless and must be upheld.”

Israel’s Danon blamed Iran and its “puppet” Hezbollah for the military action across the Lebanon-Israel border.

“While Israel is not seeking a wider conflict, let me be clear: We will not allow Hezbollah to continue its provocations,” he said. Israel will do “whatever it takes” to return its 60,000 citizens who fled their homes in the north because of attacks, “and we will not allow Hezbollah’s terror to dictate the future of our nation.”

Iran’s U.N. Ambassador Amir Saeid Iravani countered that “Israel bears full responsibility for the perpetration of such horrific crimes,” and said his government will pursue accountability for the attack on the country’s ambassador to Lebanon, whose eyes were injured in the explosions Tuesday.

He said the gravity of the attacks against the Lebanese people must also be seen as “a threat to peace and security across the region.” He added that “the international community must not ignore the role the Western countries, in particular the United States and U.K., play in enabling Israel’s aggressions.”

U.N. political chief Rosemary DiCarlo warned the council that the explosions along with more than 11 months of bloodshed in Gaza, and near-daily exchanges of fire across the Israel-Lebanon border, pose a grave risk to security and stability in the region.

She urged all actors to exercise maximum restraint, and she strongly urged countries with influence on the parties “to leverage it now.”

Earlier, U.N. spokesperson Stephane Dujarric urged Israel and Hezbollah to immediately return to the cessation of hostilities that existed before Hamas’ Oct. 7 attacks in southern Israel and Israel's responding military campaign in Gaza, warning that “the region is on the brink of a catastrophe” and a diplomatic solution should be pursued urgently.

This video grab shows a walkie-talkie that was exploded inside a house, in Baalbek, east Lebanon, Wednesday, Sept. 18, 2024. (AP Photo)

This video grab shows a walkie-talkie that was exploded inside a house, in Baalbek, east Lebanon, Wednesday, Sept. 18, 2024. (AP Photo)

Recommended Articles