Takeaway: This infographic, courtesy of Veracode, shows a nifty snapshot of top application vulnerabilities, where they’re found, and other interesting coding security nuggets.
The infographic below speaks for itself — a snapshot of code vulnerabilities representing:
…anonymized data from billions of lines of code submitted for analysis by large enterprises, commercial software providers, open source projects, and software outsourcers in Veracode’s cloud-based application risk management services platform.
[Courtesy of Veracode]
Click on the graphic to get a full-size version.
Selena has been at TechRepublic since 2002. She is currently a Senior Editor with a background in technical writing, editing, and research. She edits Data Center, Linux and Open Source, Apple in the Enterprise, The Enterprise Cloud, Web Designer, and IT Security blogs.