Security News > 2021 > July > Application security tools ineffective against new and growing threats

While the increased need for flexibility, agility, and speed continues to drive the evolution of application development and increased deployment of microservice-based architectures, many organizations have not updated their security tooling and continue to rely on traditional web application and API security tools to protect their business.
"One of the biggest security challenges we are seeing today is that technologies are rapidly evolving to better serve the growing demand for digital experiences, but the security offerings that protect those technologies are not experiencing that same level of transformation - and often erode the benefits of modern technology stacks," said Kelly Shortridge, Senior Principal Technologist at Fastly.
The challenges of ineffective application security tools On average, organizations use 11 web application and API security tools and spend close to $3 million dollars annually.
Traditional application security tools are ineffective and impede business growth.
Current security tools frequently block harmless business traffic, impacting the organization's bottom line.
Despite an anticipated increase in API implementation, half of organizations stated that web application and API security is more difficult than two years ago and indicated struggles to maintain adequate security across new application architectures.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/EeJG-3CAC4g/
Related news
- Balancing proprietary and open-source tools in cyber threat research (source)
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan] (source)
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January] (source)
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January] (source)
- Addressing the intersection of cyber and physical security threats (source)
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January] (source)
- Top 8 Penetration Testing Tools to Enhance Your Security (source)
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [3 February] (source)
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February] (source)
- Inconsistent security strategies fuel third-party threats (source)