Contact Us

edgescan Release their Industry Leading 2018 Cyber Security Vulnerability Statistics Report

edgescan Ltd, global suppliers of "Fullstack Vulnerability Management" services have released their 2018 statistics report
  • <strong>Vulnerabilities across both hosting infrastructure and web applications</strong>
  • <strong></strong>
  • <strong>2018 Vulnerability Statistics Report - Cover</strong>

"The majority of critical risks are still in the web application layer. Many of which are a result of organisations using out-dated and unpatched system components." - Owen Mooney, edgescan CTO

    DUBLIN, IRELAND, January 29, 2018 /24-7PressRelease/ -- The report includes trends and observations based on assessing thousands of web applications, Cloud and Hosting environments for the past 12 months to December 2017.

Detail on the most common vulnerabilities, root cause and quick wins are all discussed in the report. Additional features in the 2018 report discuss security vulnerabilities from a compliance standpoint and advisory in relation to how to "change the game" and improve one's security posture.

Key points of the report:
- 20% of all vulnerabilities discovered in web applications are considered High or Critical Risk issues.
- 2% of all vulnerabilities discovered in hosting infrastructure are High or Critical Risk issues.
- 29% of all security weaknesses in the web application layer were due to insecure configuration & deployment.
- 45% of all security weaknesses in the hosting and network layers were due to poor cryptography and protection of sensitive data.

"Many of the cyber security weaknesses discovered are due to simple measures not being taken. This is not a result of unwillingness to be more secure but in most cases it's rather a question of visibility and situational awareness. Our unique fullstack vulnerability management approach helps us track and measure cyber security weaknesses in a unique way resulting in the annual report." - says Eoin Keary CEO of edgescan.

Many of the problems uncovered in 2016 and the year before are still present. In 2017 we experienced some major cybersecurity breaches, many of which were a result of a technical security issue as opposed to human error. Both Large global organisations and governments were breached resulting in millions of client records being stolen. Common vulnerabilities are still easy to find due to insecure programming practices.

"The majority of critical risks are still in the web application layer. Many of which are a result of organisations using out-dated and unpatched system components." - Owen Mooney, edgescan CTO.

Report location

About edgescan:
edgescan provides fullstack vulnerability management for thousands of systems globally.

Combining advanced technology with consultant expertise, edgescan delivers web application and hosting/cloud environment security solutions that reduce risk, reduce cost and help ensure the deployment of secure applications, cloud platforms and hosting environments.

edgescan is a security-as-a-service platform providing dynamic application security testing (DAST) and host layer vulnerability management coupled with expert validation and support. As an Approved Payment Card Industry Security Vendor (PCI ASV) edgescan assists with both cybersecurity and compliance requirements for hundreds of clients globally.

The company is headquartered in Dublin, Ireland, with partners across the U.S. and Europe. For more information on edgescan, please visit

# # #

Comment on this story...

Share This Story

Email this Story

Contact Information

Eoin Keary

Voice: 353(0)16815330
E-Mail: Email Us Here
Website: Visit Our Website
Follow Us:

Like This Story?

I like it! 0


If you have any questions regarding information in this press release, please contact the person listed in the contact module of this page. Please do not attempt to contact 24-7 Press Release Newswire. We are unable to assist you with any information regarding this release. 24-7 Press Release Newswire disclaims any content contained in this press release. Please see our complete Terms of Service disclaimer for more information.