MA-VERACODE
Veracode, a leading global provider of application security testing solutions, today revealed that the healthcare sector takes first place for the proportion of software security flaws that are fixed, at 27 percent. The sector overtook financial services as the top-performing industry, demonstrating healthcare providers have made good headway toward the goal of making their software more secure over the past year.
The data was published in the company’s annual State of Software Security (SoSS) report v12, which analyzed 20 million scans across half a million applications in the healthcare, financial, technology, manufacturing, retail, and government sectors.
Chris Eng, Chief Research Officer at Veracode, said, “Healthcare is one of the more highly regulated sectors and is considered critical infrastructure by the government, so it’s encouraging to see the sector performs comparatively well in terms of overall flaw remediation. We hope healthcare developers and IT staff see this as a welcome ray of sunshine amidst the all-too-often gloomy realm of software security. There is still work to do, so here’s to more improvements in the years to come.”
Despite taking the top spot for fix rate, 77 percent of applications in the healthcare industry contain vulnerabilities, with 21 percent of applications containing high severity vulnerabilities. The sector also has ample room for improvement in terms of the time spent to fix flaws once they’re detected, taking up to a whopping 447 days to reach the halfway point of remediation.
Healthcare Breach Costs Are the Most Expensive
With healthcare companies incurring the highest average breach costs, at a new record high of $10.1 million*, taking proactive steps to minimize the risk of a cyberattack is imperative. Since data breaches in highly regulated industries tend to be associated with larger long-term costs that accrue over the ensuing years, the industry would benefit from even greater comprehensive efforts to address security earlier in the software development lifecycle.
Of the six industries analyzed, healthcare providers rank toward the bottom for the proportion of applications with any flaws, and second to last for the percentage of high-severity flaws—defined as those that present a serious risk to the application and organization if they were to be exploited. When it comes to the types of flaws discovered from dynamic analysis of applications in the sector, compared to other industries healthcare providers perform well for authentication issues and insecure dependencies, but have a higher incidence of cryptographic and deployment configuration issues.
Eng said, “We know that no application will ever be 100 percent free of security flaws, so it’s important that businesses take all necessary steps to minimize risk as much as possible. This includes scanning at a regular, rapid pace using multiple testing types, integrating testing tools into developer environments, and providing hands-on training to help developers understand the origin of flaws and how to fix or prevent them entirely. The healthcare sector should also take extra care to prioritize critical flaws—those vulnerabilities that could have a catastrophic impact if left unaddressed for too long.”
Andrew McCall, Vice President of Engineering, Azalea Health Innovations, said, “The biggest obstacle to building security into our workflows is that developers will treat security as just a checkbox. But security is an ongoing process and has to be top of mind throughout the software development life cycle. We chose Veracode because it was the easiest and best solution when it comes to integrating into our existing processes.”
Third-party Library Security
Considering a sharp increase in regulations to secure the software supply chain over the past year, the report analyzed third-party libraries to identify how vulnerabilities discovered through software composition analysis (SCA) behave. Overall, around 30 percent of vulnerable libraries remain unresolved after two years; however, that statistic reduces to 25 percent for the healthcare sector. In fact, while the overall ratio of vulnerable libraries found by SCA trends down steadily over time, healthcare experienced a brief upward spike before driving rates down dramatically over the last year or so.
The Veracode State of Software Security v12 healthcare snapshot is available to download here and the full report is available here.
* IBM Security and The Ponemon Institute, “Cost of a Data Breach Report 2022”: https://www.ibm.com/downloads/cas/3R8N1DZJ, July 2022
About the State of Software Security Report
The Veracode State of Software Security (SoSS) v12 analyzed the full historical data from Veracode services and customers. This accounts for a total of more than half a million applications (592,720) that used all scan types, more than a million dynamic analysis scans (1,034,855), more than five million static analysis scans (5,137,882) and more than 18 million software composition analysis scans (18,473,203). All those scans produced 42 million raw static findings, 3.5 million raw dynamic findings, and six million raw SCA findings.
The data represents large and small companies, commercial software suppliers, software outsourcers, and open-source projects. In most analyses, an application was counted only once, even if it was submitted multiple times as vulnerabilities were remediated, and new versions uploaded.
About Veracode
Veracode is a leading AppSec partner for creating secure software, reducing the risk of security breach, and increasing security and development teams’ productivity. As a result, companies using Veracode can move their business, and the world, forward. With its combination of process automation, integrations, speed, and responsiveness, Veracode helps companies get accurate and reliable results to focus their efforts on fixing, not just finding, potential vulnerabilities. Learn more at www.veracode.com, on the Veracode blog and on Twitter.
Copyright © 2022 Veracode, Inc. All rights reserved. Veracode is a registered trademark of Veracode, Inc. in the United States and may be registered in certain other jurisdictions. All other product names, brands or logos belong to their respective holders. All other trademarks cited herein are property of their respective owners.
To view this piece of content from cts.businesswire.com, please give your consent at the top of this page.
View source version on businesswire.com: https://www.businesswire.com/news/home/20220922005100/en/
About Business Wire
Subscribe to releases from Business Wire
Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.
Latest releases from Business Wire
INNIO wins prestigious German Sustainability Award 20269.12.2025 09:07:00 CET | Press release
INNIO Group has been awarded the German Sustainability Award for Companies 2026. At the 18th annual ceremony in Düsseldorf, INNIO was named winner in the “Engines and Turbines” category within the “Machines and Installations” sector. Recognized as one of Europe’s most respected distinctions for corporate responsibility, the German Sustainability Award reflects the United Nations’ Agenda 2030 and thus on the key areas of transformation such as climate, biodiversity, resources, supply chain, and society. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251205520809/en/ INNIO wins prestigious German Sustainability Award 2026 (c) Frank Fendler “This award is a tremendous recognition for our entire team and validates our 360-degree approach to sustainable innovation throughout the value chain,” said Marcin Kawa, VP Sustainability at INNIO Group. “We are committed to actively shaping the energy transition and delivering solutions th
EURONICS and NIQ Forge Strategic Collaboration to Elevate Retail Pricing Intelligence9.12.2025 09:00:00 CET | Press release
NIQ (NYSE: NIQ), a leading consumer intelligence company combined with GfK in 2023, has been selected by EURONICS, a leading global shopping cooperative in the Technical Consumer Goods (TCG) sector, to provide comprehensive Online Price Monitoring. NIQ's Online Price Monitoring provides insights into pricing dynamics by tracking item-level pricing across a defined data set. The system captures product information, matches items accurately, and ensures quality through advanced automated processes combined with human oversight and detailed checks. NIQ offers a range of retail pricing solutions, including pricing intelligence tools and the Consumer Price Lab, empowering businesses to make informed decisions and optimize their pricing strategies. This collaboration focuses on providing EURONICS with comprehensive pricing insights to support informed decision-making. NIQ delivers accurate and transparent data to help EURONICS understand market dynamics and plan effectively. "Through our col
SonicEdge and Earfab Partner to Shape the Future of Personalized Audio and Hearing Wellness9.12.2025 09:00:00 CET | Press release
Partnership unites SonicEdge’s micro-speaker technology with Earfab’s custom-fit innovation to deliver unmatched comfort and fidelity SonicEdge, a pioneer in micro-acoustic innovation, today announced a strategic partnership with Earfab, the innovator of custom-fit hearing technology, to co-develop a new generation of personalized audio solutions that unite comfort, precision, and hearing safety. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251209472421/en/ Credit: SonicEdge By combining SonicEdge’s high-performance MEMS speaker-in-chip technology with Earfab’s custom-fit eartips – crafted using its proprietary earfabSCAN 3D smartphone scanning platform – the collaboration delivers a first-of-its-kind experience that redefines in-ear performance. The joint solution provides a perfect acoustic seal for enhanced sound fidelity, improved active noise cancellation, and long-term listening comfort – without compromising hearing
Outpost24 Acquires Infinipoint to Power Its Entry into the Zero Trust Workforce Access Market9.12.2025 08:00:00 CET | Press release
The strategic acquisition strengthens market leadership by unifying user identity with device trust, eliminating security blind spots. Outpost24, a leader in exposure management and identity security, today announced the acquisition of Infinipoint, a specialist in device identity, posture validation, and secure workforce access. The acquisition marks Outpost24’s entry into the Zero Trust Workforce Access market and enhances its identity security division, Specops, by laying the foundation for a unified approach that evaluates both the user and the device before access is granted. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251208750630/en/ Ido Erlichman, Chief Executive Officer of Outpost24. As organizations advance their Zero Trust strategies, authentication alone is no longer enough. MFA and SSO confirm who the user is, but they do not validate the security of the device being used. In hybrid environments where employee
VSO Submits VCP v1.0 to Nineteen Regulatory Authorities Across Thirteen Jurisdictions and Completes First Integrated Evaluation in a Production-Like Environment9.12.2025 08:00:00 CET | Press release
The VeritasChain Standards Organization (VSO) announced today that it has submitted the VeritasChain Protocol (VCP) v1.0 to nineteen regulatory authorities across thirteen jurisdictions, including the United States, United Kingdom, European Union, Singapore, Hong Kong, United Arab Emirates (DIFC), Australia, India, South Korea, Switzerland, Brazil, Liechtenstein, and Saudi Arabia. The submissions present VCP v1.0 as a cryptographic audit framework designed to address emerging supervisory requirements under the EU AI Act Article 12 for logging and traceability, and MiFID II / RTS 25 for timestamp integrity and event ordering in AI-driven and algorithmic trading systems. VSO also confirmed the first completed integration of VCP v1.0 within a controlled, production-like evaluation environment operating under its Early Access Program. The environment successfully generated cryptographically linked event chains, immutable hashing, and verifiable proofs using RFC-aligned structures, demonstr
In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.
Visit our pressroom
