GIS user technology news

News, Business, AI, Technology, IOS, Android, Google, Mobile, GIS, Crypto Currency, Economics

  • Advertising & Sponsored Posts
    • Advertising & Sponsored Posts
    • Submit Press
  • PRESS
    • Submit PR
    • Top Press
    • Business
    • Software
    • Hardware
    • UAV News
    • Mobile Technology
  • FEATURES
    • Around the Web
    • Social Media Features
    • EXPERTS & Guests
    • Tips
    • Infographics
  • Blog
  • Events
  • Shop
  • Tradepubs
  • CAREERS
You are here: Home / News / Business / Study Reveals Only 11% of Information Security Managers Trust Security Level of Their Applications

Study Reveals Only 11% of Information Security Managers Trust Security Level of Their Applications

September 5, 2013 By Editor

Quotium research shows the large majority of security managers feel their organization’s applications are still vulnerable to hacker attacks, despite best efforts to employ wide range of solutions to prevent application threats

 

LONDON, Aug. 30, 2013 — Application vulnerabilities are a major factor in the cyber-crime game. The objectives of Quotium’s research published today was to better understand the solutions used to secure applications in leading corporates in Europe and in the United States. More than 500 CISOs and Security managers have been interviewed about the security state of their applications, the frequency of attacks in their organizations and the solutions in place to mitigate these security threats.

 

The first fact that arises from the study is that most of the big organizations interviewed currently have processes in place to test their web applications vulnerabilities. Most of them use penetration testing services, automated testing tools – mostly applications scanners or static code analyzers – or web application firewalls to secure their assets.

 

However, a majority of security managers are unsure of the current level of their application security state and do believe that a hacker could manage to exploit their applications. Also almost half do not have a clear view on the attacks currently performed against their organization.

 

One of the most interesting findings of this study is the gap between the efforts put into protecting applications and the actual state of the applications. While almost all organizations invest time, money and energy into protecting their infrastructure, using one or more types of service or technology, most applications remain vulnerable and are still being attacked. That’s why it’s important to build trust in the information security system with Tentacle.

 

The research and linked Infographic can be found at this address: http://www.quotium.com/research/State_of_application_security_Infographic.php

app security infographic 

 

About Quotium Technologies
Quotium Technologies is a specialist in the development of innovative software solutions to guarantee the security and performance of business critical applications throughout their lifecycle. Quotium is an Interactive Application Security Testing (IAST) pioneer with the release of its application security testing software Seeker. Seeker’s technology increases the accuracy of application testing by combining the detection of a potential vulnerability with verification through a real-time exploit attempt. With accuracy, clarity and simplicity, Seeker solution maximizes the return on investment applications.

 

Filed Under: Business, Infographics Tagged With: Competitions, Developer Tools, News, Programs, Study Reveals Only 11% of Information Security Managers Trust Security Level of Their Applications

Editor’s Picks

JavaScript: Best Practice

JavaScript: Best Practices

Microsoft unveils the future of Windows

Esri Helps Developers Add Geo to Apps at TechCrunch Disrupt NY 2016

USGS Lidar Base Specification Version 1.2

See More Editor's Picks...

About Editor

Glenn is a geographer and a GIS professional with over 20 years experience in the industry. He's the co-founder of GISuser and several other technology web publications.

Recent Industry News

Best Equipment Labels for Industrial Use: Ranked Systems That Survive Real-World Conditions

April 17, 2026 By GISuser

Building a Global Natural Brand: The Digital Journey of VedaOils

April 15, 2026 By GISuser

DeltaQuad partners with Meridein Group OÜ to strengthen UAS capability in the Baltics

April 15, 2026 By GISuser

The Complete Guide to Improving Home Safety and Efficiency with Dryer Vent Cleaning

April 12, 2026 By GISuser

Hot News

State of Data Science Report – AI and Open Source at Work

HERE and AWS Collaborate on New HERE AI Mapping Solutions

Virtual Surveyor Adds Productivity Tools to Mid-Level Smart Drone Surveying Software Plan

Categories

Copyright gletham Communications 2015 - 2026

Go to mobile version