Featured Images

Outsourcing in the age of cybersecurity concerns

It’s only natural that security comes up when talking about software development. There’s no denying that poor software development practices and subsequent security issues can go hand in hand. The risks can be alarming. Access to an enterprise’s database can be embedded into code. There could be unknown backdoors and other vulnerabilities, allowing hackers to access customer information like usernames, passcodes, credit cards numbers or other sensitive data. Unfortunately, we hear about this all too often in the news.

“Seemingly on a weekly or even daily basis we learn about a cyber security breach on a major corporation,” notes Udi Mokady, the founder, president and CEO of CyberArk, an IT security solutions company, in a J.P Morgan QA. “It used to be that unless you were a bank, credit card processor or manufacturer of military weaponry, cyber attackers wouldn’t bother to zero in on you. Now, no one is safe: everyone has something of value. Cyber attackers have broadened their targets, attacking companies of all sizes in industries such as retail, media, energy, manufacturing and IT services, among others.”

So, outsourcing software engineering must make security more risky then, right? Well, no. Developers themselves are without a doubt aware of the risks. For example, The Software Integrity Risk Report, a study conducted by Forrester Consulting and commissioned by Coverity (now a part of Synopsys), says more than 74 percent of respondents state developers are held more accountable for quality and security goals than a year ago. The study is a survey of 336 software development influencers in North America and Europe, and it explores current practices and market trends for managing software quality, security and safety.

Also, developers in the EMEA regions (Europe, the Middle East and Africa) note extreme concern with security in their development projects, based on the EMEA Development Survey by Evans Data. In fact, many developers have taken steps to safeguard projects and apply security mechanisms to combat threats. Some of the most commonly used, according to Evans Data research, are:

Leave a Reply

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>