State of Software Security Volume 8
By CATechnologies, Veracode
Added
In this, the eighth volume of this report, they present metrics that are based on real application risk postures, drawn from code-level analysis of nearly 250 billion lines of code across 400,000 assessmnets performed over a period of 12 months between April 1, 2016 and March 31, 2017.
Tags
Vulnerability Application security Threat actor Security incident Extortion SQL injection Injection attack- Malware defenses Benchmark CredentialsTopic Map
