• About
  • Subscribe
  • Contact
Friday, June 6, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Management Leadership Finance Governance, Risk and Compliance

Closing in on open source & its vulnerabilities

FutureCIO Editors by FutureCIO Editors
June 24, 2022
Source: https://www.pexels.com/photo/man-person-people-woman-7652248/

Source: https://www.pexels.com/photo/man-person-people-woman-7652248/

In a report released recently by Snyk and Linux Foundation, there are more vulnerabilities that developers admit to be exposed to. The report is based on a survey of over 550 respondents in the first quarter of 2022 as well as data from Snyk Open Source, which has scanned more than 1.3B open source projects.

Snyk, the leader in developer security, has collaborated with The Linux Foundation, a global nonprofit organisation enabling innovation through open source, to come out with some startling discoveries on The State of Open Source Security. 

This first-of-its-kind report details the significant security risks resulting from the widespread use of open source software within modern application development as well as how many organisations are currently ill-prepared to effectively manage these risks. Specifically, the report found:

  • Over four out of every ten (41%) organisations don't have high confidence in their open source software security;
  • Three in ten (30%) organisations without an open source security policy openly recognize that no one on their team is currently directly addressing open source security.
  • The average application development project has 49 vulnerabilities and 80 direct dependencies (open source code called by a project); and,
  • The time it takes to fix vulnerabilities in open source projects has steadily increased, more than doubling from 49 days in 2018 to 110 days in 2021.


Dangers from code reuse

“Software developers today have their own supply chains – instead of assembling car parts, they are assembling code by patching together existing open source components with their unique code. While this leads to increased productivity and innovation, it has also created significant security concerns,” said Matt Jarvis, Director, Developer Relations, Snyk. The report found widespread evidence suggesting industry naivety about the state of open source security today.

Specifically, the report found:

“Software developers today have their own supply chains – instead of assembling car parts, they are assembling code by patching together existing open source components with their unique codes. While this leads to increased productivity and innovation, it has also created significant security concerns,” said Matt Jarvis, Director, Developer Relations, Snyk.

“This first-of-its-kind report found widespread evidence suggesting industry naivety about the state of open source security today. Together with The Linux Foundation, we plan to leverage these findings to further educate and equip the world’s developers, empowering them to continue building fast, while also staying secure.”


“While open source software undoubtedly makes developers more efficient and accelerates innovation, the way modern applications are assembled also makes them more challenging to secure,” said Brian Behlendorf, General Manager, Open Source Security Foundation

(OpenSSF). “This research clearly shows the risk is real, and the industry must work even more closely together in order to move away from poor open source or software supply chain security practices.”

41% of organisations don't have high confidence in open source software security

Modern application development teams are leveraging code from all sorts of places. They reuse code from other applications they’ve built and search code repositories to find open source components that provide the functionality they need. The use of open source requires a new way of thinking about developer security that many organizations have not yet adopted.

Source: https://www.pexels.com/photo/people-sitting-on-a-chair-working-7439770/

● Less than half (49%) of organisations have a security policy for OSS development or usage (and this number is a mere 27% for medium-to-large companies); and,

● Three in ten (30%) organisations without an open source security policy openly recognise that no one on their team is currently directly addressing open source security.


Average application development project: 49 vulnerabilities spanning 80 direct dependencies

When developers incorporate an open source component in their applications, they immediately become dependent on that component and are at risk if that component contains vulnerabilities. The report shows how real this risk is, with dozens of vulnerabilities discovered across many direct dependencies in each application evaluated.

This risk is also compounded by indirect, or transitive, dependencies, which are the dependencies of your dependencies. Many developers do not even know about these dependencies, making them even more challenging to track and secure.

That said, to some degree, survey respondents are aware of the security complexities created by open source in the software supply chain today:

● Over one-quarter of survey respondents noted they are concerned about the security impact of their direct dependencies;

● Only 18% of respondents said they are confident of the controls they have in place for their transitive dependencies; and,

● Forty percent of all vulnerabilities were found in transitive dependencies.

Time to fix: More than doubled from 49 Days in 2018 to 110 days in 2021

As application development has increased in complexity, the security challenges faced by development teams have also become increasingly complex. While this makes development more efficient, the use of open source software adds to the remediation burden. The report found that fixing vulnerabilities in open source projects takes almost 20% longer (18.75%) than in proprietary projects.

Related:  Paying ransomware is no guarantee of data recovery
Tags: cybersecurityLinuxOpen Source Security and Risk Analysissoftware development
FutureCIO Editors

FutureCIO Editors

No Result
View All Result

Recent Posts

  • Indosat and GoTo launch a new 70 billion parameter model with a multilingual chat service
  • Mainframes: Powering Asia’s business-critical industries in 2025
  • Canva taps Snowflake AI Data Cloud to accelerate growth
  • Tech and startup platform e27 announces the return of Echelon Singapore 2025
  • MERaLiON Version 2 unveiled with enhanced multilingual processing and emotional intelligence

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers
Show More

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

Select Category
    • Privacy Policy
    • Terms of Use
    • Cookie Policy

    Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

    Login to your account below

    or

    Not a member yet? Register here

    Forgotten Password?

    Fill the forms bellow to register

    All fields are required. Log In

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    No Result
    View All Result
    • Management Leadership
      • Growth Strategies
      • Finance
      • Operations
      • Sales and Marketing
      • Careers
    • Technology
      • Infrastructure and Platforms
      • Business Applications and Databases
      • Big Data, Analytics and Intelligence
      • Security
    • Industry Verticals
      • Finance and Insurance
      • Manufacturing
      • Logistics and Transportation
      • Retail and Wholesale
      • Hospitality and Tourism
      • Government and Public Services
      • Utilities
      • Media and Telecommunications
    • Resources
      • Whitepapers
      • PodChats
      • Videos
    • Events
    Login

    Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

    Subscribe