Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

66% of applications in the utilities sector have at least one exploitable security vulnerability per year

utilities-sector-freepik
July 27, 2021

NTT Application Security released its six-month trend findings in its AppSec Stats Flash Vol. 7, reporting on the current state of application security and the wider threat landscape, including Window of Exposure (WoE), Vulnerability by Class, and Time to Fix. Each month, the AppSec Stats Flash reflects on the evolving threat landscape, tracks key AppSec metrics on an ongoing basis and brings forward key actionable takeaways for security and development teams who are responsible for the applications that run their business.

Trends from the past 6 months include:

  • Applications in the Utilities sector continues to top the chart, with 66% of applications in the industry having at least one serious exploitable vulnerability throughout the year.
  • Education, Manufacturing, and Retail and Wholesale Trade applications each saw an increase in WoE this month. The Wholesale Trade sector experienced a 7% increase in the WoE, while Education, Retail Trade and Manufacturing rose by 4% and healthcare rose by 2%.
  • The Finance and Insurance sectors improved over last month, reporting a 2% drop in their WoE. Conversely, the Healthcare sector’s WoE increased by 2%.
  • The Wholesale Trade sector has seen a 15% increase in WoE, while Utilities has experienced an 11% increase since the beginning of the year.
  • Manufacturing, Public Administration and Healthcare are large sectors that have each seen a decline in their respective Window of Exposures, likely due to an increased focus on security following targeted breach activity and/or new regulation(s).

Additional findings include:

  • Window of Exposure
    • Wholesale trade as a sector has seen a 15% increase in Window of Exposure, while Utilities as a sector has seen a 11% increase in Window of exposure since the beginning of the year. 
    • Manufacturing, Public Administration and Healthcare are large sectors that have seen a decline in their respective Window of Exposures, likely due to increased focus as a result of either targeted breach activity and/or new regulation.
  • Remediation Rates
    • Remediation rates across all vulnerability severities is decreasing.
    • Remediation rates for critical vulnerabilities decreased from 54% at the beginning of the year to 48% at the end of June.
    • Remediation rates for high vulnerabilities decreased from 50% at the beginning of the year to 38% at the end of June.
  • Time to Fix
    • Time to Fix (TTF) for all vulnerability severities is increasing.
    • Average TTF for critical vulnerabilities increased from 197 days at the beginning of the year to 202 days at the end of June.
    • Average TTF for high vulnerabilities increased from 194 days at the beginning of the year to 246 days at the end of June.

 

Key-Takeaways:

  • Overall, the remediation rate for severe vulnerabilities is on the decline while the average time to fix is on the increase. These two trends contribute to an overall increase in the window of exposure for applications in general. 
  • The top 5 vulnerability classes by prevalence remain constant - pointing to a systematic failure to address these well-known vulnerabilities.
  • The prevalence of HTTP Response Splitting is on the rise. Organizations should pay special attention to upgrading underlying open-source components that contribute to this application vulnerability.
KEYWORDS: application security cyber security threat landscape utilities security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Understanding the Distinct and Dependent Roles of Data, Privacy and Cybersecurity Professionals

    94% of organizations experienced at least one business-impacting cyberattack in the past year

    See More
  • Man and women in office

    83% of organizations faced at least one account takeover the past year

    See More
  • ransomware on laptop

    75% of OT organizations had at least 1 intrusion in the last year

    See More

Related Products

See More Products
  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing