With data breaches through third-party applications lighting up news headlines left and right, the scrutiny on cohesion between software vendors and their customers is at an all time high. And it should be high because as we noted in our State of Software Security Supplement Report 90% of third-party code does not comply with enterprise security standards such as the OWASP Top 10.

As a result of the large and growing footprint of third-party software in the enterprise, regulatory bodies such as the OCC and industry organizations such as FS-ISAC, OWASP and the PCI Security Standards Council are now placing increased focus on controls required to mitigate the risks introduced by third-party software.

That's why the next question in our Future of Application Security series is:

What's the best way to work with vendors and suppliers on application security?

Watch Our Other Video Surveys

Neil is a Marketing Technologist working on the Content and Corporate teams at Veracode. He manages much of the Veracode web presence while also working on strategic interactive media projects. In his spare time you'll find him drinking the CrossFit kool-aid, getting overly competitive in a video game, or doting over his lovely wife and daughter.

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.

 

 

 

contact menu