The report represents more than 650 organizations and tens of thousands of real-world websites continually monitored by WhiteHat Sentinel Services. I’m reading through the WhiteHat Website Security Statistics Report released yesterday, and there’s plenty of interesting data points. Here are some nuggets. First, a word on how this was put together: The company sifted through data from more than 650 organizations and tens of thousands of real-world websites continually monitored by WhiteHat Sentinel Services. Among the high points (or low points, depending on one’s perspective): 86 percent of all websites had at least one serious* vulnerability. The average number of serious* vulnerabilities identified per website was 56, continuing the downward trend from 79 in 2011 and 230 in 2010. Serious* vulnerabilities were resolved in an average of 193 days from first notification. 61 percent of all serious* vulnerabilities were resolved, slightly less than the 63 percent during from 2011, but still up from 53 percent in 2010 and far better than 2007 when it was just 35 percent. *Serious vulnerabilities are defined as those in which an attacker could take control over all, or some part, of the website, compromise user accounts on the system, access sensitive data, violate compliance requirements, and possibly make headline news. In short, serious vulnerabilities are those that should really be fixed. As far as the Top Ten most prevalent vulnerability classes in 2012, the list is relatively close to last year’s, though Information Leakage surpassed Cross-Site Scripting yet again: 1.) Information Leakage – 55 percent of websites 2.) Cross-Site-Scripting – 53 percent of websites 3.) Content Spoofing – 33 percent of websites 4.) Cross-site Request Forgery – 26 percent of websites 5.) Brute Force –26 percent of websites 6.) Fingerprinting – 23 percent of websites 7.) Insufficient Transport Layer Protection –22 percent of websites 8.) Session Fixation – 14 percent of websites 9.) URL Redirector Abuse – 13 percent of websites 10.) Insufficient Authorization – 11 percent of websites Meanwhile: –57 percent of organizations surveyed provide some amount of instructor-led or computer-based software security training for their programmers. These organizations experienced 40 percent fewer vulnerabilities, resolved them 59 percent faster, but exhibited a 12 percent lower remediation rate. –39 percent of organizations said they perform some amount of Static Code Analysis on their website(s) underlying applications. These organizations experienced 15 percent more vulnerabilities, resolved them 26 percent slower, and had a 4 percent lower remediation rate. –Fifty-five percent of organizations said they have a Web Application Firewall (WAF) in some state of deployment. These organizations experienced 11 percent more vulnerabilities, resolved them 8 percent slower, and had a 7 percent lower remediation rate. Download the full report here. Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe