<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 41% of cyber-security apps contain high-risk open source vulnerabilities in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/41-of-cyber-security-apps-contain-high-risk-open-source/m-p/10453#M938</link>
    <description>&lt;P&gt;In this day and age where knowledge gained by degree has more standing than experience and cut and paste or reuse is more familiar and speeded than an appropriate development practice are you surprised at this? It has always been easier to copy chunks of code from someone else than to develop your own and who cares if it has bugs - someone in the wider community will fix it eventually. This is what happens when you let the children run the playground.&lt;/P&gt;</description>
    <pubDate>Sun, 20 May 2018 13:56:23 GMT</pubDate>
    <dc:creator>CEMyers</dc:creator>
    <dc:date>2018-05-20T13:56:23Z</dc:date>
    <item>
      <title>41% of cyber-security apps contain high-risk open source vulnerabilities</title>
      <link>https://community.isc2.org/t5/Industry-News/41-of-cyber-security-apps-contain-high-risk-open-source/m-p/10447#M936</link>
      <description>&lt;P&gt;Each year, the Black Duck OnDemand audit services group conducts open source audits on thousands of applications for its customers—primarily in conjunction with merger and acquisition transactions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This 2018&amp;nbsp;&lt;A href="https://www.synopsys.com/content/dam/synopsys/sig-assets/reports/2018-ossra.pdf" target="_self"&gt;report&lt;/A&gt; is based on data from various sectors such as healthcare, mobile app markets, IoT, big data, and more.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Key Findings&lt;/STRONG&gt;:&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;96% of commercial codebases contain open source components.&lt;/LI&gt;&lt;LI&gt;78% of codebases had at least one open source bug, compared to 67% last year.&lt;/LI&gt;&lt;LI&gt;The average number of flaws per database has increased by 134% in this time to 64.&lt;/LI&gt;&lt;LI&gt;Over 4,800 vulnerabilities were found in open source software last year.&lt;/LI&gt;&lt;LI&gt;Over 50% of them were high risk, with 17% being highly publicised.&lt;/LI&gt;&lt;LI&gt;The applications of Internet and software infrastructure had the highest percentage of high risk open source vulnerabilities at 67%, followed by internet and mobile apps at 60%, VR and gaming/ media at 50%, and cybersecurity companies 41%&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Mon, 09 Oct 2023 08:46:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/41-of-cyber-security-apps-contain-high-risk-open-source/m-p/10447#M936</guid>
      <dc:creator>leroux</dc:creator>
      <dc:date>2023-10-09T08:46:20Z</dc:date>
    </item>
    <item>
      <title>Re: 41% of cyber-security apps contain high-risk open source vulnerabilities</title>
      <link>https://community.isc2.org/t5/Industry-News/41-of-cyber-security-apps-contain-high-risk-open-source/m-p/10453#M938</link>
      <description>&lt;P&gt;In this day and age where knowledge gained by degree has more standing than experience and cut and paste or reuse is more familiar and speeded than an appropriate development practice are you surprised at this? It has always been easier to copy chunks of code from someone else than to develop your own and who cares if it has bugs - someone in the wider community will fix it eventually. This is what happens when you let the children run the playground.&lt;/P&gt;</description>
      <pubDate>Sun, 20 May 2018 13:56:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/41-of-cyber-security-apps-contain-high-risk-open-source/m-p/10453#M938</guid>
      <dc:creator>CEMyers</dc:creator>
      <dc:date>2018-05-20T13:56:23Z</dc:date>
    </item>
    <item>
      <title>Re: 41% of cyber-security apps contain high-risk open source vulnerabilities</title>
      <link>https://community.isc2.org/t5/Industry-News/41-of-cyber-security-apps-contain-high-risk-open-source/m-p/10693#M974</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1304477409"&gt;@CEMyers&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;In this day and age where knowledge gained by degree has more standing than experience and cut and paste or reuse is more familiar and speeded than an appropriate development practice are you surprised at this?&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I'd add that there is a marked disconnect between the average Product Development team and the field / consumers of security products.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've posted on linkedin about Cisco &amp;amp; Palo Alto products previously requiring flash, one of, if not the most vulnerable software products available&amp;nbsp;(open source or otherwise)&amp;nbsp; Add to that the&amp;nbsp;hidden installs that flash has, in the past at any rate,&amp;nbsp; bundled in and its ridiculous all the way around (looking at you Intel/Mcafee - desktop "security" products none the less)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Implemented&amp;nbsp;properly I'd&amp;nbsp;suggest open source is capable of being just as secure as purchased software, possibly more so if the devOps team is applying appropriate tools &amp;amp; controls to the development processes &amp;amp; source code. If devsec is not effective (which seems to often be the case) it seems like a toss up as to general assessment of vulnerabilities &amp;amp; associated risks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As some of the&amp;nbsp;more recent "headlines" have been malware impacting months old vulnerabilities, it certainly doesn't seem like "security users"&amp;nbsp;are any better (generally) .&amp;nbsp; But I'd agree&amp;nbsp;with anyone saying it would be nice, and we should be expecting, security companies to be better.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;/d&lt;/P&gt;</description>
      <pubDate>Thu, 24 May 2018 14:56:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/41-of-cyber-security-apps-contain-high-risk-open-source/m-p/10693#M974</guid>
      <dc:creator>Dain</dc:creator>
      <dc:date>2018-05-24T14:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: 41% of cyber-security apps contain high-risk open source vulnerabilities</title>
      <link>https://community.isc2.org/t5/Industry-News/41-of-cyber-security-apps-contain-high-risk-open-source/m-p/10728#M984</link>
      <description>&lt;P&gt;What about IoTs, which sneak into homeowners domains, without them even being aware they exist or how to update the firmware let alone that potentially they are turned on all the time.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example and the list goes on and on:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://blog.trendmicro.com/trendlabs-security-intelligence/device-vulnerabilities-connected-home-remote-code-execution-and-more/" target="_blank"&gt;https://blog.trendmicro.com/trendlabs-security-intelligence/device-vulnerabilities-connected-home-remote-code-execution-and-more/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 May 2018 19:31:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/41-of-cyber-security-apps-contain-high-risk-open-source/m-p/10728#M984</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-05-24T19:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: 41% of cyber-security apps contain high-risk open source vulnerabilities</title>
      <link>https://community.isc2.org/t5/Industry-News/41-of-cyber-security-apps-contain-high-risk-open-source/m-p/10765#M987</link>
      <description>&lt;P&gt;do routers really count as IOT?&amp;nbsp; I have a web connected A/C, I love it.&amp;nbsp; Its also on its own SSID with access to nothing else...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Makes a good case for e.g. Meraki, even tho they aren't exactly consumer friendly in their pricing.&lt;/P&gt;</description>
      <pubDate>Fri, 25 May 2018 02:03:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/41-of-cyber-security-apps-contain-high-risk-open-source/m-p/10765#M987</guid>
      <dc:creator>Dain</dc:creator>
      <dc:date>2018-05-25T02:03:58Z</dc:date>
    </item>
  </channel>
</rss>

