Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    ThreadFix 2.4 Adds Hot Spot Detection to Find Shared Software Flaws

    Written by

    Sean Michael Kerner
    Published January 11, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      There are multiple tools that organizations can use to scan applications for potential vulnerabilities, but it can sometimes be a challenge to make sense of all the information that different tools provide.

      It’s a challenge that Denim Group has been aiming to help solve with its ThreadFix platform. On Jan. 10, Denim Group announced the debut of ThreadFix 2.4, providing enhanced capabilities to help organizations manage application vulnerability information.

      “ThreadFix is a platform that allows organizations to manage and run their application security programs,” Dan Cornell, CTO of Denim Group, told eWEEK.

      Cornell explained that with ThreadFix an organization can list all the development teams that they have that build software and all the applications that each team is responsible for. Results for all the different application scanning and threat assessment tools used by an enterprise can then be pulled into ThreadFix. The ThreadFix platform normalizes and de-duplicates the data, providing an organization with a full view of all the software vulnerabilities that are present.

      With the complete view of application vulnerabilities, the ThreadFix platform then enables developers to monitor and manage the identified vulnerabilities through an organization’s bug defect resolution process. The ThreadFix platform also provides metrics and reporting capabilities for a company’s ability to handle and resolve application vulnerabilities.

      Among the enhanced capabilities in the new ThreadFix 2.4 release is a feature Denim Group is calling Hot Spot detection. What Hot Spot does is it looks for vulnerabilities in shared components and libraries across an organization’s software.

      “The Hot Spot technology identifies internal organization code re-use that results in vulnerabilities that are shared across applications,” Cornell said.

      By identifying shared code vulnerabilities, Cornell expects that organizations will be able to more rapidly fix applications that are running in an organization.

      Scanning for common library re-use is not a new idea in software vulnerability scanning. Among the vendors that also provide that capability is Black Duck software that looks for known vulnerabilities in re-used code. One way to identify vulnerable components is simply by identifying which version of a given open-source software library is being used and then looking to see if there are any known vulnerabilities, identified by a Common Vulnerabilities and Exposures (CVE) number.

      In ThreadFix’s use-case, the technology is targeted more at internal custom code development by organizations, where vulnerabilities likely do not have assigned or known CVEs. Cornell explained that ThreadFix has a patented approach to identifying the common vulnerabilities.

      “We get results from testing solutions and we do analysis of the software package and file names and looking at the contents of the files,” Cornell said.

      He explained that, for example, with a SQL injection flaw, testing results could show that an attack will enter an application at a particular line of code, in a specific file, then the attack payload will get passed through to another point in the system.

      “We analyze the data flow and look at the actual code and do some matching to identify situations where code has been shared,” Cornell said.

      Cornell commented that a core goal of ThreadFix has always been to help organizations understand the most impactful risks.

      “You’re never going to have enough resources, developers and budget to fix everything, so you have to make decisions,” Cornell said. “A big part of our evolution has been how to show application security managers what is important and how to we help them sift through data to identify what really needs to be fixed.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.