White papers

The State Of Application 2018 and Beyond

Issue link: https://resources.whitesourcesoftware.com/i/932186

Contents of this Issue

Navigation

Page 3 of 14

For Security & riSk ProFeSSionalS The State Of Application Security, 2018 January 23, 2018 © 2018 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. citations@forrester.com or +1 866-367-7378 3 Application Security Is Worsening, But Automation Offers Hope fIGUre 1 Software And Apps Were top targets in Successful Breaches Base: 404 network security decision makers whose rms have had an external security breach in the past 12 months Source: Forrester Data Global Business Technographics ® Security Survey, 2017 "How was the external attack carried out?" (Multiple responses accepted) Software vulnerability (software exploit) 41% Web application (SQL injection, cross-site scripting, remote le inclusion) 38% Use of stolen credentials (logins, encryption keys) 30% Strategic web compromise (watering hole attack) 23% DDoS 22% Exploitation of lost/stolen asset (e.g., smartphone, tablet, laptop, external hard drive, USB Žash drive, etc.) 21% Mobile malware 20% DNS 19% Phishing 15% Ransomware 13% Social engineering 7% Other 1% Software vulnerabilities and web applications are the top two ways external attacks are carried out.

Articles in this issue

Links on this page

view archives of White papers - The State Of Application 2018 and Beyond