Developers behaving badly: Why holistic AppSec is key

A recent survey shows that untested software releases, rampant pushing of unvetted and uncontrolled AI-derived code, and bad developer security are all culminating to seriously expand security risks across software development.
Add in the explosion of low-code/no-code development and economic headwinds that are pressuring developers to deliver features with less support, and the AppSec world is in for a perfect storm in 2024.
Mature organizations recognize they need to mature their AppSec approach to keep pace with modern development and release practices.
Here's why a more holistic AppSec approach is key.
It has to do with the security hygiene practiced by developers daily.
About three-quarters of developers admit to circumventing security measures by doing things like disabling multi-factor authentication, or doing an end-around on VPN to speed up their work.
This report points to a huge need for security support in creating developer guardrails that are embedded in the CI/CD pipeline, so that developers can still move quickly but so so safely.
Nir Valtman, founder of the software security firm Arnica, said minimizing the attack surface by reducing the permissions to source code, the place where the problem starts, was key.
A big part of this holistic approach to curbing bad operational security is visibility.
Ideally, security should get buy-in with their approach.
Tools like GitHub Copilot and ChatGPT stand to greatly accelerate developer productivity, but utilizing code produced through GenAI adds more to the risk equation.
In a recent Security Table Podcast, longtime Sppsec veteran Jim Manico, founder of Manicode Security, explains the scenario succinctly.
To use AI as a developer is necessary because if you don't your productivity is going to be one-third to a fourth of your peers.
If you're using AI without security review, you're screwed in a bad way.
The Developers Behaving Badly report found that most developers are failing to do that review.
Holistic AppSec programs are going to need the policies, developer education, tooling, and security guardrails necessary to meet these AI risks head-on, as it is inevitable that generative AI is embedded into developer processes given tools like GitHub Copilot.
Speaking of inevitability, another huge one is the looming risks that are coming for organizations with regard to low-code/no-code development environments - both for professional developers and citizen developers.
This is a looming issue that didn't make it into the Developers Behaving Badly survey but which when combined with generative AI, is poised to cause the number of applications needing security scrutiny to mushroom.
Just like with the rest of development environments, the modern AppSec team will need to start building automated guardrails and testing into low-code/no-code development in order to attain holistic AppSec.
This is a Security Bloggers Network syndicated blog from ReversingLabs Blog authored by Ericka Chickowski.


This Cyber News was published on securityboulevard.com. Publication date: Thu, 07 Dec 2023 13:43:04 +0000


Cyber News related to Developers behaving badly: Why holistic AppSec is key

Developers behaving badly: Why holistic AppSec is key - A recent survey shows that untested software releases, rampant pushing of unvetted and uncontrolled AI-derived code, and bad developer security are all culminating to seriously expand security risks across software development. Add in the explosion ...
11 months ago Securityboulevard.com
CISOs See Software Supply Chain Security As Bigger Blind Spot Than GenAI: Cycode - PRESS RELEASE. SAN FRANCISCO, Dec. 06, 2023 - Cycode, the leader in Application Security Posture Management, today announced the inaugural State of ASPM 2024 report, the industry's first. The research found that AppSec chaos reigns, with 78% of CISOs ...
11 months ago Darkreading.com
Alert fatigue puts pressure on security and development teams - Security practitioners are under a tremendous amount of pressure to secure today's applications, according to Cycode. The research found that AppSec chaos reigns, with 78% of CISOs responding that today's AppSec attack surfaces are unmanageable and ...
11 months ago Helpnetsecurity.com
Legit Posture Score empowers security teams to measure and manage their AppSec posture - Help Net Security - This new feature further enhances the Legit ASPM platform, providing security and development teams with the ability to measure, compare, and improve their application security posture over time, ensuring their software factories and applications in ...
2 months ago Helpnetsecurity.com
Building For a More Secure Future: How Developers Can Prioritize Cybersecurity - At the time, he was breaking new ground, repeating those words to help convince his teams on how crucial developers were going to be to the success of their platform. While the focus may have been initially on enterprise B2B platforms with Microsoft, ...
10 months ago Cyberdefensemagazine.com
Mastering Cybersecurity: Developer Training - Discover how to create an effective and engaging training program for your developers. Create a security training program with clearly defined goals to influence your developers to prioritize learning. Developers are likelier to participate and exert ...
10 months ago Feeds.dzone.com
78% of CISOs Concerned About AppSec Manageability - A substantial 78% of CISOs have expressed concerns about the current unmanageability of application security attack surfaces, emphasizing the need for improvement. The figure comes from Application Security Posture Management firm Cycode's inaugural ...
11 months ago Infosecurity-magazine.com
With the Right Support, Developers Can Lead Your Organization to Superior PCI-DSS 4.0 Compliance - The Payment Card Industry Data Security Standard version 4.0 will change almost everything about security for any business or organization that accepts electronic payments, which is a vast majority of them. Make no mistake, this update will be ...
11 months ago Feeds.dzone.com
5 Tips for Strengthening the Developer-Security Team Relationship - COMMENTARY. In the ever-evolving realm of software development, the interaction between developers and security teams is critically important, with security analysts typically depending on developers to address vulnerabilities in previously written ...
11 months ago Darkreading.com
Customer compliance and security during the post-quantum cryptographic migration | AWS Security Blog - For example, using the s2n-tls client built with AWS-LC (which supports the quantum-resistant KEMs), you could try connecting to a Secrets Manager endpoint by using a post-quantum TLS policy (for example, PQ-TLS-1-2-2023-12-15) and observe the PQ ...
2 months ago Aws.amazon.com
Shift-left Convergence with Generative AI Improves the Programmer's Role - The ongoing 'shift left' movement in software development - where testing and quality control measures are moved earlier in the application lifecycle - is pushing developers into less familiar areas such as security. While intended to deliver more ...
10 months ago Feedpress.me
Stytch offers toolkit for developers to build, implement, and customize passkey-based authentication - Stytch announced its Passkeys offering, giving developers the easiest way to build, customize and maintain passkey-based authentication in their applications. Stytch's new solution offers a flexible, API-first approach to passkeys that abstracts the ...
11 months ago Helpnetsecurity.com
Part 2: Smart Shift Left - In my previous blog post, we discussed the state of the union for shift left and and how many organizations are not implementing correctly. Recognizing the consequences of a poor shift left model. Many of the high friction points with a poor shift ...
8 months ago Feedpress.me
Cybersecurity Awareness Month: Cybersecurity awareness for developers - Siri Varma, tech lead and software development engineer with Microsoft Security, works with both developers and cybersecurity teams every day. Next, there’s the knowledge gap; coders may lack the necessary understanding of security practices, ...
2 months ago Securityintelligence.com
Google Adds Gemini Pro API to AI Studio and Vertex AI - Google also announced Duet AI for Developers and Duet AI in Security Operations, but neither uses Gemini yet. Starting Dec. 13, developers can use Google AI Studio and Vertex AI to build applications with the Gemini Pro API, which allows access to ...
11 months ago Techrepublic.com
Thwarting Common Vulnerabilities: Financial Sector - DZone - By providing that kind of training alongside things like incentives for security champions and privilege-based initiatives where only the best, most security-aware developers who have completed their training are allowed to work with critical assets, ...
2 months ago Feeds.dzone.com
Product showcase: Protect digital identities with Swissbit's iShield Key Pro - In today's fast-paced business world, protecting digital identities and optimizing daily workflows are crucial. The iShield Key Pro series from Swissbit addresses these challenges by offering top-notch security combined with effortless usability. ...
5 months ago Helpnetsecurity.com
AI Coding Tools: How to Address Security Issues - In 2022, a surge of AI-based coding assistants revolutionized the software development landscape. Even though organizations everywhere are using AI-based coding, there remains a tug-of-war within organizations between the benefits and security fears ...
11 months ago Securityboulevard.com
Product showcase: Apiiro unifies AppSec and SSCS in a deep ASPM - With the rapidly evolving threat landscape and complexity of interconnected applications, identifying real, business-critical application risks is more challenging than ever. Application security teams need a better solution than their current siloed ...
11 months ago Helpnetsecurity.com
New Developer Tools Are Necessary to Boost Passkey Adoption - The password-less technology known as passkeys are esoteric, far from widely adopted, and confusing for consumers. Based on the WebAuthn standard created by the World Wide Web Consortium and the FIDO Alliance - and jointly supported by Apple, Google, ...
10 months ago Darkreading.com
Key Group uses leaked builders of ransomware and wipers | Securelist - The first discovered sample of Key Group, the Xorist ransomware, established persistence in the system by changing file extension associations. The .huis_bn extension added to encrypted files in the early versions of Key Group samples, Xorist and ...
2 months ago Securelist.com
Legal and Compliance Considerations in Cloud Computing - This paradigm change has faced challenges, primarily legal and compliance issues. This can present severe legal issues, particularly regarding data ownership. According to S. Krishnan, the transforming nature of computing has created legal ...
10 months ago Feeds.dzone.com
What Do Apple's EU App Store Changes Mean for App Developers? - In order to comply with the European Union's Digital Markets Act, Apple announced on Jan. 25 changes to its payment system for app sellers in the EU, and that it was letting go of the hold its App Store has over iOS app distribution in the EU. As ...
10 months ago Techrepublic.com
Behind EB Control's Revolutionary Patented Key Management System - If you're knee-deep in the world of data security, you'd agree that the key to unlocking superior protection lies, quite literally, in the keys- the encryption keys, to be precise. When it comes to managing these critical elements to safeguard your ...
11 months ago Securityboulevard.com
Bitwarden: how to create and use Passkeys to sign in - They can use a master password and improve security by adding a two-factor authentication option to the process. A private part of it never leaves the device, which means that all standard password attacks don't work against passkeys. I used the ...
10 months ago Ghacks.net

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)