Business Wire

MA-VERACODE

22.9.2022 14:32:58 CEST | Business Wire | Press release

Share
Healthcare Sector Leads the Way for Fix Rate of Software Security Flaws

Veracode, a leading global provider of application security testing solutions, today revealed that the healthcare sector takes first place for the proportion of software security flaws that are fixed, at 27 percent. The sector overtook financial services as the top-performing industry, demonstrating healthcare providers have made good headway toward the goal of making their software more secure over the past year.

The data was published in the company’s annual State of Software Security (SoSS) report v12, which analyzed 20 million scans across half a million applications in the healthcare, financial, technology, manufacturing, retail, and government sectors.

Chris Eng, Chief Research Officer at Veracode, said, “Healthcare is one of the more highly regulated sectors and is considered critical infrastructure by the government, so it’s encouraging to see the sector performs comparatively well in terms of overall flaw remediation. We hope healthcare developers and IT staff see this as a welcome ray of sunshine amidst the all-too-often gloomy realm of software security. There is still work to do, so here’s to more improvements in the years to come.”

Despite taking the top spot for fix rate, 77 percent of applications in the healthcare industry contain vulnerabilities, with 21 percent of applications containing high severity vulnerabilities. The sector also has ample room for improvement in terms of the time spent to fix flaws once they’re detected, taking up to a whopping 447 days to reach the halfway point of remediation.

Healthcare Breach Costs Are the Most Expensive

With healthcare companies incurring the highest average breach costs, at a new record high of $10.1 million*, taking proactive steps to minimize the risk of a cyberattack is imperative. Since data breaches in highly regulated industries tend to be associated with larger long-term costs that accrue over the ensuing years, the industry would benefit from even greater comprehensive efforts to address security earlier in the software development lifecycle.

Of the six industries analyzed, healthcare providers rank toward the bottom for the proportion of applications with any flaws, and second to last for the percentage of high-severity flaws—defined as those that present a serious risk to the application and organization if they were to be exploited. When it comes to the types of flaws discovered from dynamic analysis of applications in the sector, compared to other industries healthcare providers perform well for authentication issues and insecure dependencies, but have a higher incidence of cryptographic and deployment configuration issues.

Eng said, “We know that no application will ever be 100 percent free of security flaws, so it’s important that businesses take all necessary steps to minimize risk as much as possible. This includes scanning at a regular, rapid pace using multiple testing types, integrating testing tools into developer environments, and providing hands-on training to help developers understand the origin of flaws and how to fix or prevent them entirely. The healthcare sector should also take extra care to prioritize critical flaws—those vulnerabilities that could have a catastrophic impact if left unaddressed for too long.”

Andrew McCall, Vice President of Engineering, Azalea Health Innovations, said, “The biggest obstacle to building security into our workflows is that developers will treat security as just a checkbox. But security is an ongoing process and has to be top of mind throughout the software development life cycle. We chose Veracode because it was the easiest and best solution when it comes to integrating into our existing processes.”

Third-party Library Security

Considering a sharp increase in regulations to secure the software supply chain over the past year, the report analyzed third-party libraries to identify how vulnerabilities discovered through software composition analysis (SCA) behave. Overall, around 30 percent of vulnerable libraries remain unresolved after two years; however, that statistic reduces to 25 percent for the healthcare sector. In fact, while the overall ratio of vulnerable libraries found by SCA trends down steadily over time, healthcare experienced a brief upward spike before driving rates down dramatically over the last year or so.

The Veracode State of Software Security v12 healthcare snapshot is available to download here and the full report is available here.

* IBM Security and The Ponemon Institute, “Cost of a Data Breach Report 2022”: https://www.ibm.com/downloads/cas/3R8N1DZJ, July 2022

About the State of Software Security Report

The Veracode State of Software Security (SoSS) v12 analyzed the full historical data from Veracode services and customers. This accounts for a total of more than half a million applications (592,720) that used all scan types, more than a million dynamic analysis scans (1,034,855), more than five million static analysis scans (5,137,882) and more than 18 million software composition analysis scans (18,473,203). All those scans produced 42 million raw static findings, 3.5 million raw dynamic findings, and six million raw SCA findings.

The data represents large and small companies, commercial software suppliers, software outsourcers, and open-source projects. In most analyses, an application was counted only once, even if it was submitted multiple times as vulnerabilities were remediated, and new versions uploaded.

About Veracode

Veracode is a leading AppSec partner for creating secure software, reducing the risk of security breach, and increasing security and development teams’ productivity. As a result, companies using Veracode can move their business, and the world, forward. With its combination of process automation, integrations, speed, and responsiveness, Veracode helps companies get accurate and reliable results to focus their efforts on fixing, not just finding, potential vulnerabilities. Learn more at www.veracode.com, on the Veracode blog and on Twitter.

Copyright © 2022 Veracode, Inc. All rights reserved. Veracode is a registered trademark of Veracode, Inc. in the United States and may be registered in certain other jurisdictions. All other product names, brands or logos belong to their respective holders. All other trademarks cited herein are property of their respective owners.

To view this piece of content from cts.businesswire.com, please give your consent at the top of this page.

View source version on businesswire.com: https://www.businesswire.com/news/home/20220922005100/en/

About Business Wire

Business Wire
Business Wire
101 California Street, 20th Floor
CA 94111 San Francisco

http://businesswire.com
DK

Subscribe to releases from Business Wire

Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.

Latest releases from Business Wire

Boomi Activates Data for the Enterprise9.3.2026 14:00:00 CET | Press release

New platform innovations activate contextual data to power production-scale enterprise AI, with a new European platform instance for localized control Boomi™, the data activation company, today announced new capabilities within the Boomi Enterprise Platform. Data activation brings data to life across systems and processes, delivering it with the right context and timing to power everything from AI to BI. The Boomi Enterprise Platform, the foundation that puts data in motion, now adds new semantic context to help AI agents operate on grounded business realities, expands governed SAP data movement with change data capture, enhances transparency and oversight across agentic workflows, and introduces a dedicated European platform instance for localized data control. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260309682526/en/ Boomi Activates Data for the Enterprise “Last year, Boomi helped enterprises move from experimentatio

Thredd Accelerates in 2026 with its Global Platform and Delivering Enterprise-Scale Outcomes9.3.2026 14:00:00 CET | Press release

Thredd, the AI-first issuer processing platform, today announced a major acceleration phase for 2026, marked by the appointment of Marilyn McDonald as Chief Technology Officer and the promotion of Ryan Dew to Chief Product Officer. Thredd has never been in a stronger position. A fully cloud-native version of its global platform is live in the United States, with end-to-end credit capabilities launching in the coming months alongside a state-of-the-art debit platform and modern unified ledger. Marilyn McDonald joins as CTO to lead the next phase of enterprise-scale execution. She succeeds Edwin Poot, who helped lead the modernisation of Thredd’s architecture and technology stack, laying the foundation for cloud-native and agentic growth. Marilyn brings global transformation experience from senior roles at Citigroup, Mastercard, Expedia Group and StubHub. Her focus is on strengthening operational readiness, bank-grade delivery, enterprise execution and continuous resilience as Thredd sca

MariaDB to Acquire GridGain: Architecting the Real-Time Foundation for the Agentic Enterprise9.3.2026 14:00:00 CET | Press release

Strategic acquisition unites MariaDB’s mission-critical relational database with GridGain’s extreme in-memory speed to power the next generation of AI applications MariaDB plc today announced that it has entered into a definitive agreement to acquire GridGain Systems, Inc., the pioneer of in-memory computing and creator of open source Apache Ignite. By merging MariaDB’s AI-ready relational database with GridGain’s scalable, in-memory power, MariaDB is setting a new industry standard: sub-millisecond data infrastructure for the agentic era. Closing the AI Latency Gap As enterprises move beyond passive chatbots toward agentic AI – autonomous systems that reason, plan and execute tasks – they are quickly becoming limited by traditional data architectures. AI agents require real-time access to massive datasets with zero friction. This acquisition bridges that gap by fusing: MariaDB’s reliability: Proven, ACID-compliant transactional integrity for the world’s most sensitive data, with nativ

Safe Software Announces the Peak of Data and AI 2027, a Premier Global Conference, in London, UK9.3.2026 14:00:00 CET | Press release

Safe Software (Safe) officially announced today the return of its global user conference, the Peak of Data and AI, taking place March 9–11, 2027, at the QEII Centre in London, UK. A Partner Summit will kick off the event on March 8, 2027, bringing together Safe’s global partner community ahead of the main conference. Hosted every two years, the Peak of Data and AI has evolved from Safe Software’s long-running user conference into a premier global event for data and AI professionals. The conference alternates between North America and international locations, with previous events held in Bonn, Germany (2023) and Seattle, Washington (2025). “At the Peak of Data and AI, we bring together the people who are shaping how organizations use data to drive real-world outcomes,” said Don Murray, CEO of Safe Software. “With London as our host city in 2027, we’re excited to connect with the global community to learn, listen, and share what’s next for data and AI.” The three-day conference will feat

Quectel Modules Demonstrate Compliance Readiness for EU Cyber Resilience Act Regulatory Requirements9.3.2026 13:45:00 CET | Press release

Quectel Wireless Solutions, a global end-to-end IoT solutions provider, today reiterates that its cybersecurity program for its module portfolio supports compliance with the European Union’s Cyber Resilience Act (CRA), ahead of the 11 September 2026 deadline. Quectel’s best practice product security ensures customers can meet the CRA’s mandatory requirements for security by design, SBOM availability and vulnerability disclosure and incident reporting, reinforcing Quectel’s commitment to delivering secure, future-ready IoT solutions for the European and global markets. Quectel has worked closely with Finite State, a leader in connected device and software supply chain security, to ensure Quectel’s product portfolio is both secure and compliant for the EU CRA and other industry standards globally. The partnership reinforces a clear focus on transparency, regulatory alignment and a commitment to maintaining industry-leading cybersecurity standards. “Finite State has been Quectel’s third p

In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.

Visit our pressroom
World GlobeA line styled icon from Orion Icon Library.HiddenA line styled icon from Orion Icon Library.Eye