Feeds

Hackers target outsourced app development

Who's got your code?

Internet Security Threat Report 2014

Many firms fail to think about security when they outsource application development.

Three in five (60 per cent) organisations overlook procedures to mandate security in software development outsourcing, according to a study by analysts Quocirca. One in five (20 per cent) fail to consider security even when building applications in-house.

Quocirca's figures come from a survey of 250 senior executives in the UK, US, and Germany. It found that outsourcing of code development is widespread, and growing in importance. More than 50 per cent of those organisations quizzed outsourced more than 40 per cent of their code development needs.

Hackers are increasingly targeting application rather than operating system vulnerabilities.

TS Ameritrade showed last year what such practises can do when it admitted that a backdoor created by an outsourced programmer was to blame for the loss of 6.3 million customers' details.

The report found that financial services companies are most likely to outsource their code development needs, with 72 per cent reporting that they outsource more than 40 per cent of this work. The majority (84 per cent) of these organisations said code development is either business critical or important.

Public sector organisations are also big outsourcers, with 55 per cent outsourcing more than 40 per cent of their code development.

By contrast, utilities rarely outsource such work - just seven per cent outsource more than eight percent of code development.

"Not enough is being done by organisations to build security into the applications on which their businesses rely," said Fran Howarth, principal analyst at Quocirca and author of the report. "Not only that, but they are entrusting large parts of their application development needs to third parties. This creates an even greater onus for organisations to thoroughly test all code generated for applications — without which they could be playing into the hands of hackers."

The survey also found that exposure to Web 2.0 technologies — among the least understood, but considered to be among the most insecure software development models — is high. It also found that data protection is the key driver behind application security for the majority of organisations polled. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.