NV-VERACODE
1.8.2024 13:56:35 CEST | Business Wire | Press release
Black Hat USA Conference (booth #2536) – Veracode, a global leader in application risk management, today announced platform innovations to help organizations uncover, prioritize, and reduce security debt across their growing attack surface. Universal Connector and Application Security Heatmap, the two newest capabilities from Longbow powered by Veracode, allow organizations to quickly connect findings from any source and see the applications that are contributing to the most risk. Together, the Universal Connector and the Application Security Heatmap provide clear, operational insight into assets and issues, allowing remediation actions to be prioritized by quantifiable risk.
This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20240801020287/en/
Figure 1: State of Software Security 2024 Language Snapshot (Graphic: Business Wire)
“The combination of mounting security debt, an expanding attack surface made more vulnerable by generative AI, and an overwhelming volume of security alerts makes it challenging for organizations to know which application risks to prioritize,” said Chris Eng, Chief Research Officer at Veracode. “In fact, our State of Software Security research shows that many organizations are more focused on remediating low-severity flaws than critical flaws. Security leaders need technology that enables them to effectively uncover and manage application risk, and then reduce that risk by focusing on the issues that matter most across their entire attack surface.”
Prioritization of Security Debt: Critical vs Non-critical
In its State of Software Security 2024 Language Snapshot, Veracode revealed the varying prevalence of “critical” and “non-critical” security debt among applications written in different languages. Critical security debt is defined for this report as high-severity flaws that remain unfixed for longer than a year. If exploited, these flaws would put the integrity and availability of organizations at serious risk.
The research found that while most security debt exists in first-party code written by in-house developers, the most critical security debt resides in third-party code (e.g., open-source software imported into the codebase). For example, 80 percent of critical debt in Java apps, and 63 percent in JavaScript apps, is in third-party code. The report also found about 51 percent of critical flaws in Java apps turn into security debt, while only about 45 percent of low to medium flaws progress into security debt.
Eng said, “With the overflowing volume of security flaws, developers are not prioritizing those that present the most risk. While focusing on non-critical flaws may result in some quick fixes, developers should use their limited capacity to work on fixing critical flaws with the highest potential impact on security.”
Putting Visibility and Prioritization First: Universal Connector & Application Security Heatmap
Building on Veracode’s acquisition of Longbow Security in April this year, and the introduction of Longbow’s Repo Risk Visibility and Analysis capability in May, Universal Connector and Application Security Heatmap are designed with developers’ time in mind. The capabilities provide operational oversight to help developers and security teams quickly identify and prioritize the most important fixes for growing security debt across their applications.
Universal Connector allows organizations to quickly access disparate source data they otherwise couldn’t bring into the Longbow platform, meaning they don’t have to wait for a tool-specific connector. The Application Security Heatmap maps the application back to the owner and shows a 90-day risk trend, as well as enabling customization of the risk threshold to meet organizational policy. Application security teams and developers can analyze each application, view the distribution of risk, and implement recommendations for the Best Next Action™ to remediate that risk.
“As organizations seek to find and fix mounting critical security debt, the need for risk-focused visibility and prioritization is clear,” said Derek Maki, Vice President of Product Management at Veracode. “The new capabilities in the Longbow platform provide our customers with a deeper understanding of an organization’s riskiest applications, plus the unique ability to identify the top five most impactful solutions for improvement.”
Enhanced by the Longbow acquisition, Veracode closes the gap between development and security teams, delivering visibility from code repositories to cloud assets and runtime. Longbow also identifies infrastructure-as-code and misconfiguration risk for cloud assets originating from repositories.
The Longbow Universal Connector and Application Security Heatmap are available immediately. For more information, please visit the website or watch the interview with Brian Roche, Veracode Chief Executive Officer, and Derek Maki.
The full State of Software Security 2024 Language Snapshot is available on the Veracode website.
Visitors to the Black Hat USA Conference, August 3-8, 2024, can learn more about Veracode’s platform and these new features by visiting Veracode’s booth #2536 for a demo.
About the State of Software Security Report
The Veracode State of Software Security 2024 report analyzed data from large and small companies, commercial software suppliers, software outsourcers, and open-source projects. The research draws from more than a million (1,007,133) applications across all scan types, 1,553,022 dynamic analysis scans, and 11,429,365 static analysis scans. All those scans produced 96 million raw static findings, 4 million raw dynamic findings, and 12.2 million raw software composition analysis findings.
About Veracode
Veracode is a global leader in Application Risk Management for the AI era. Powered by trillions of lines of code scans and a proprietary AI-assisted remediation engine, the Veracode platform is trusted by organizations worldwide to build and maintain secure software from code creation to cloud deployment. Thousands of the world’s leading development and security teams use Veracode every second of every day to get accurate, actionable visibility of exploitable risk, achieve real-time vulnerability remediation, and reduce their security debt at scale. Veracode is a multi-award-winning company offering capabilities to secure the entire software development life cycle, including Veracode Fix, Static Analysis, Dynamic Analysis, Software Composition Analysis, Container Security, Application Security Posture Management, and Penetration Testing.
Learn more at www.veracode.com, on the Veracode blog, and on LinkedIn and X.
Copyright © 2024 Veracode, Inc. All rights reserved. Veracode is a registered trademark of Veracode, Inc. in the United States and may be registered in certain other jurisdictions. All other product names, brands or logos belong to their respective holders. All other trademarks cited herein are property of their respective owners.
To view this piece of content from cts.businesswire.com, please give your consent at the top of this page.
View source version on businesswire.com: https://www.businesswire.com/news/home/20240801020287/en/
About Business Wire
Subscribe to releases from Business Wire
Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.
Latest releases from Business Wire
Power Integrations Extends Flyback Topology to Enable 440 W, Offering Simpler Alternatives to Resonant Power Designs23.3.2026 22:45:00 CET | Press release
New TOPSwitchGaN ICs more than double power output, reducing system cost, complexity, and design time APEC 2026 – Power Integrations (NASDAQ: POWI), the leader in high-voltage integrated circuits for energy-efficient power conversion, today introduced a breakthrough in flyback topology extending the power range of flyback converters to 440 W—well beyond the limits that traditionally required more complex resonant and LLC topologies. The new TOPSwitchGaN™ flyback IC family unites the company’s groundbreaking PowiGaN™ technology with its iconic TOPSwitch™ IC architecture, reducing complexity, eliminating heat sinks in many cases, shortening design time, improving manufacturability, and lowering total system cost. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260323686299/en/ The new TOPSwitchGaN™ flyback IC family extends the power range of flyback converters to 440 W—well beyond the limits that traditionally required more co
I-Pulse Announces Strategic Partnership to Advance Geothermal Pulsed Power Applications in the Millungera Basin, Australia23.3.2026 22:40:00 CET | Press release
I-Pulse to assume operational control of Millungera Basin Geothermal Project with Sunrise Energy Metals, Greenvale Mining Millungera Basin Total Identified Stored Energy Estimated to Exceed 611,000 Petajoules, or 600x Australia’s Current Annual Electricity Consumption I-Pulse’s G-Pulse Tool Deploys High Pulsed Power to Unlock Access to Geothermal Energy I-Pulse Co-Founder, Chairman, and CEO Robert Friedland, I-Pulse Co-Founder and Head of Technology Laurent Frescaline, and Sunrise Energy Metals Managing Director Sam Riggall, are delighted to announce a partnership to deploy and validate I-Pulse’s G-Pulse pulsed power drilling technology in the Millungera Basin, a large-scale geothermal clean energy resource located in northwest Queensland, Australia. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260323421297/en/ Left: Millungera Basin location in Queensland, Australia. Right: Millungera Basin (in brown) to the east of the M
The Estée Lauder Companies’ Statement on Potential Transaction with Puig23.3.2026 21:15:00 CET | Press release
The Estée Lauder Companies Inc. (NYSE: EL) confirms that it is in discussions regarding a potential business combination with Puig, in which the two companies would potentially merge their businesses. No final decision has been made, and no agreement has been reached. Unless and until an agreement is signed between the companies, there can be no assurances regarding the deal or its terms. Forward-Looking Statement This press release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. These statements include, but are not limited to, statements regarding a potential transaction and the anticipated timing, terms, and completion of any such transaction. Forward-looking statements are based on current expectations and assumptions and are subject to risks and uncertainties that could cause actual results to differ materially. These risks and uncertainties include, among others, the possibility that no agreement will be reached, tha
Kinaxis Recognized as a Leader in the 2026 Gartner® Magic Quadrant™ Reports for Supply Chain Planning23.3.2026 19:12:00 CET | Press release
Recognition based on company’s Completeness of Vision and Ability to Execute Kinaxis® Inc. (TSX: KXS), a global leader in supply chain orchestration, today announced it has been positioned as a Leader in both the 2026 Gartner® Magic Quadrant™ for Supply Chain Planning Solutions for Discrete Industries and the 2026 Gartner® Magic Quadrant™ for Supply Chain Planning Solutions for Process Industries. In both reports, Gartner recognized Kinaxis for its ability to execute and completeness of vision. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260323129357/en/ Kinaxis Recognized as a Leader in the 2026 Gartner® Magic Quadrant™ Reports for Supply Chain Planning: Discrete Industries Kinaxis has been recognized as a Leader in the Gartner® Magic Quadrant™ for Supply Chain Planning Solutions for eleven times in a row. Kinaxis has also been recognized as a Leader in the 2026 Gartner Magic Quadrant for Supply Chain Planning Solutions
Armis Centrix™ Named “Best Solution” for Cyber Exposure Management as Armis Wins Multiple Global InfoSec Awards at RSAC 202623.3.2026 17:00:00 CET | Press release
Armis awarded “Publisher’s Choice Cybersecurity Company”Yevgeny Dibrov received “Industry Pioneering CEO” Armis, the cyber exposure management & security company, today announced that it has won multiple Global InfoSec Awards from Cyber Defense Magazine at this year’s RSAC™ Conference. Armis received the following accolades: Armis Centrix™ won “Best Solution” for Cyber Exposure Management Armis named “Publisher’s Choice Cybersecurity Company” Yevgeny Dibrov, Armis’ CEO and Co-Founder, awarded “Industry Pioneering CEO” “We cannot safeguard modern infrastructure with yesterday’s tactics; the extended attack surface demands a unified, AI-driven approach that sees, protects and manages all assets (IT, OT, IoT, IoMT, applications, code, cloud and AI) in real time,” said Yevgeny Dibrov, CEO and Co-Founder of Armis. “Armis secures the most complex environments of organizations and governments worldwide to protect society from the destruction cybercriminals seek to cause. These awards reinforc
In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.
Visit our pressroom
