Rising DevSecOps Adoption Pressure: AI Complexity Strains AppSec Teams

Application security (AppSec) teams are experiencing heightened strain as organizations continue to expand their adoption of DevSecOps practices. The integration of development, security, and operations teams is expected to grow significantly over the next two years, increasing from 38% to 48%, a shift that is placing immense pressure on already resource-strapped security teams. This rapid evolution is driven primarily by the need for faster, more secure software delivery methods in an increasingly digital world.

The Integration of DevSecOps

The Growing Need for DevSecOps Adoption

Organizations are increasingly recognizing that the integration of development, security, and operations—collectively known as DevSecOps—is crucial for maintaining robust security postures while meeting agile development demands. According to a report from ESG, the percentage of organizations adopting DevSecOps practices is expected to grow from 38% to 48% in the next two years. This growth is not without its challenges, however, as the need for tighter collaboration and faster response times continues to strain security resources. One of the significant obstacles is the existing workload on security teams, which are often already stretched thin handling routine tasks and threat management.

Another complication in this evolving landscape is the rise of generative AI (GenAI), which adds another layer of complexity to security efforts. An overwhelming 97% of organizations surveyed are either using or planning to implement GenAI in their software development processes. This rapid adoption has generated heightened concerns about securing AI-related applications. These complexities underline the necessity for AppSec teams to reevaluate their strategies and adapt quickly to maintain effective oversight in an increasingly complex environment. The blend of new technologies and enhanced development practices demands a robust, integrated security approach.

The Critical Issue of Visibility

One pressing issue identified in the survey is the lack of visibility between security and development teams. Approximately 42% of respondents can test and fix their code without involving their security departments, creating potential security vulnerabilities that could be exploited. This siloed approach hinders effective communication and collaboration, leading to possible oversights and gaps in security. Melinda Marks, ESG’s practice director of cybersecurity, emphasizes the urgency for AppSec teams to actively engage with development and DevOps teams, gaining a deeper understanding of their workflows, processes, and existing security measures.

Marks advises aligning on common goals such as application uptime, customer service excellence, and robust data protection. To achieve this, organizations must foster an environment where security is seen as a shared responsibility across all teams. By embedding security practices into the daily operations and workflows of development and DevOps teams, organizations can create a more cohesive and proactive security posture. This integration helps in identifying and mitigating security risks early in the development cycle, ultimately enhancing the overall resilience of the software.

Strategic Recommendations for AppSec Teams

Integrating Security Tools and Processes

Melinda Marks further recommends incorporating security tools and processes directly into developers’ workflows. Automating security testing early in the software development life cycle should be a priority to ensure that potential vulnerabilities are identified and addressed before they can be exploited. Ensuring that security teams have control and visibility over these tools is critical for maintaining a cohesive security strategy. This integration not only streamlines the development process but also helps in standardizing security practices across the organization, making it easier to manage and mitigate risks.

Karthik Swarnam, chief security and trust officer of ArmorCode, underscores the importance of leveraging AI for enhanced security testing. AI can automate many routine tasks, allowing human experts to focus on more complex aspects of security. Automating the DevSecOps pipeline ensures that security considerations are embedded throughout the development process, reducing the risk of human error and increasing efficiency. Tools that offer comprehensive visibility into potential security risks and assist in remediation efforts should be prioritized. These tools provide invaluable insights, enabling faster identification and mitigation of vulnerabilities.

Focusing on Critical Tasks and Training

Swarnam also emphasizes the importance of concentrating on critical tasks such as identifying and mitigating urgent vulnerabilities. Security teams must prioritize areas that pose the most significant threats and allocate resources accordingly. This targeted approach helps in addressing the most pressing security issues without diluting efforts across less critical tasks. Providing targeted training for developers is also essential to avoid inefficiencies and ensure that best practices are followed. Developers equipped with the right skills and knowledge can play a critical role in fortifying the overall security posture.

Ensuring the security of AI applications is particularly crucial in this context. AI systems, if not adequately protected, can introduce new vulnerabilities or lead to data mishandling. Both Marks and Swarnam agree on the necessity of improving visibility and communication between security and development teams. This alignment helps in creating a unified approach to vulnerability management, ensuring that security risks are identified and addressed promptly. Integrating security and development teams into a comprehensive vulnerability management program, supported by business and executive-level dashboards, can enhance the prioritization and remediation of critical security gaps.

Enhancing Overall Security Posture

Improving Communication and Collaboration

The integration of DevSecOps practices and the rise of generative AI technologies have underscored the need for better communication and collaboration between security and development teams. By focusing on shared goals such as application uptime, data protection, and customer service, organizations can create a more cohesive and effective security strategy. This collaborative approach ensures that security is embedded into every stage of the development process, reducing the risk of vulnerabilities and enhancing the overall robustness of the software.

The use of business and executive-level dashboards can further aid in prioritizing remediation efforts by focusing on the most critical security gaps. These dashboards provide a clear overview of the organization’s security posture, enabling timely and informed decision-making. By concentrating on critical tasks, leveraging AI for automation, and providing targeted training for developers, organizations can create a more resilient security environment. Ensuring that all teams work together towards a common goal not only streamlines processes but also fosters a culture of continuous improvement.

Conclusion

Application security (AppSec) teams are grappling with increased demands as more organizations adopt DevSecOps, a practice that blends development, security, and operations. This trend is on an upward trajectory, with current adoption rates at 38% expected to rise to 48% within the next two years. This surge underscores the urgency for faster and more secure software delivery in today’s digital landscape, putting an enormous strain on security teams who are often already stretched thin. As businesses rush to integrate these functions to accelerate software development and enhance security, the workload and pressure on AppSec teams intensify.

In this evolving environment, AppSec professionals are tasked with ensuring that security measures are not only thorough but seamlessly integrated into every phase of the software development lifecycle. This necessity for agility and security means they must keep up with both the rapid pace of development and the sophisticated nature of emerging threats. Consequently, they are required to develop new skills, adopt more efficient tools, and collaborate closely with developers and operations staff to address vulnerabilities swiftly. The balance between speed and security has never been more critical, placing AppSec teams at the heart of this transformation.

Explore more

Leaders and Staff Divided on Corporate Change

The blueprint for a company’s future is often drawn with bold lines and confident strokes in the boardroom, yet its translation to the daily reality of the workforce reveals a narrative fractured by doubt and misalignment. Corporate restructuring has become a near-constant feature of the modern business environment, an accepted tool for navigating market volatility and technological disruption. However, a

Trend Analysis: Data Center Community Conflict

Once considered the silent, unseen engines of the digital age, data centers have dramatically transformed into flashpoints of intense local conflict, a shift epitomized by recent arrests and public outrage in communities once considered quiet backwaters. As the artificial intelligence boom demands unprecedented levels of power, land, and water, the clash between technological progress and community well-being has escalated from

PGIM Buys Land for $1.2B Melbourne Data Center

The global economy’s insatiable appetite for data has transformed vast, unassuming tracts of land into the most coveted real estate assets of the 21st century. In a move that underscores this trend, PGIM Real Estate has acquired a significant land parcel in Melbourne, earmarking it for a multi-stage data center campus with an initial investment of AU$1.2 billion. This transaction

Trend Analysis: Hyperscale AI Data Centers

The relentless computational appetite of generative AI is now reshaping global infrastructure, sparking an unprecedented race to construct specialized data centers that are becoming the new symbols of national power. As artificial intelligence models grow in complexity, the demand for processing power has outstripped the capacity of traditional cloud services, creating a new market for facilities built exclusively for AI

LockBit 5.0 Unleashes Multi-Platform Ransomware Attacks

The digital landscape has been irrevocably altered by the arrival of a cyber threat engineered for maximum disruption, forcing organizations worldwide to confront a new and far more versatile adversary. Released in September 2025, the LockBit 5.0 ransomware variant immediately distinguished itself as a landmark evolution in cyber extortion. Its meticulously designed multi-platform attack capabilities, combined with sophisticated techniques to