Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity News

2018 Set a New Record for Security Vulnerabilities

By Tae Jin (TJ) Kang
Doorway to Cybersecurity
January 26, 2019

With more than 16,500 known security vulnerabilities being catalogued, 2018 set a new record over last year’s previous record of 14,714. CEOs and security teams of all businesses should take note of this issue, given the recent enforcement of the General Data Protection Regulation (GDPR), which penalizes corporate data/privacy breaches of EU citizens with staggering fines. Organizations can be fined up to 4 percent of annual global turnover or €20 million. That’s for each offense.

The only well-documented breach of EU citizen data since the enforcement of the GDPR enforcement is Facebook’s loss of data from over 29 million user accounts, three million of which belong to EU residents. It’s clear that Facebook will go to court to try and circumvent having to pay what will possibly be record fines for data loss.

A Glimpse at the Scope of Open Source Vulnerabilities

Despite its already staggering adoption rate, more open source code is being developed and shared than ever before. More than 90% of the software being written and used today – across a spectrum of consumer, corporate, industrial and governmental systems and devices – leverages open source. But there’s a caveat – accompanying this increase in the number of developed and shared lines of code is also the increase in the number of reported vulnerabilities.

Hackers Love Known Software Vulnerabilities

When searching for weaknesses in applications, middleware and operating systems, hackers first target known security vulnerabilities.

These vulnerabilities are well-documented, providing a “roadmap” for hackers to follow. Whether software code is proprietary or open source, it harbors security vulnerabilities. Advocates of open source argue that the accessibility and transparency of the code allow the “good guys” – corporate quality assurance teams, white hat hackers and open source project groups – to find bugs faster.

Conversely, critics of open source contend that more attackers than defenders examine the code, resulting in a net effect of higher incidents of vulnerability exploits. Whichever is the case, the open source community is good at addressing vulnerability issues. Once security risks are discovered, the community will quickly catalogue and provide patches for these vulnerabilities.

The Number of Reported Vulnerabilities is Increasing

The number of reported vulnerabilities is on the rise. The U.S. government has been tracking this issue as well, through their sponsorship of the Common Vulnerability and Exposure (CVE) list and the National Vulnerability Database (NVD). In 2018, this public database published 14,760 known security vulnerabilities – more than twice as many as were reported in 2016.

Further complicating matters is the fact that “good” open source code can be used in many different ways – across a spectrum of applications. When a heavily leveraged piece of open source code contains a security flaw, it may render vulnerable a potentially large number of software applications that have integrated this code.

So how are these known vulnerabilities able to lurk in applications, platforms and devices that leverage open source?

While updated versions of open source components, modules and libraries are available without security vulnerabilities, in-house software development teams and third-party developers are hard-pressed to effectively track all open source software components in their internally developed and externally sourced code.

These challenges are partly due to the software development and procurement model, whereby development teams often receive third-party software in binary format.

Know What’s in Your Code

Development, security and software provisioning teams can leverage binary code scanners that use code fingerprinting. These tools extract “fingerprints” from a binary to be examined, and then compare them to the fingerprints collected from open source components hosted in well-known open source repositories. Once a component and its version are identified through this fingerprint matching, development and security teams can easily find the known security vulnerabilities associated with the component from vulnerability databases, like the NVD.

Make Time to Address the Vulnerabilities

As engineering teams develop new versions of software, they are alerted to potential security vulnerabilities that must be fixed. Unfortunately, the software development industry has demonstrated a tendency to give vulnerability remediation low priority. This lack of urgency may delay the updating to a later version of the software, extending the window of opportunity during which malicious actors can exploit the unaddressed vulnerabilities. This model results in known security vulnerabilities going unaddressed for significant periods of time, further exacerbating a company’s vulnerability.

Open source adoption has and will continue to generate amazing innovations. However, the growing number of security vulnerabilities in the code are also generating potential data and privacy loss that have very real financial consequences. Software developers, distributors and users can neutralize the threats posed by these vulnerabilities by understanding their code, finding the flaws and proactively taking steps to address them.

KEYWORDS: data breach GDPR open source security privacy laws security vulnerability

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tae Jin (TJ) Kang is a technology industry executive and entrepreneur. He is the President and CEO of Insignary (www.insignary.com). In addition to founding a number of successful technology startups, Kang has held senior management positions with global technology leaders that include Korea Telecom and Samsung Electronics, among others. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • code-enews

    Infrastructure-Based Security Vulnerabilities Put Your Business in Peril

    See More
  • Cybersecurity Leadership Images

    The Equifax Breach Was Likely Preventable

    See More
  • cyber5-security-freepik1170x658.jpg

    2021 breaks the record for security vulnerabilities

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing