-->
AppSec is going through a transformative moment. For the first time in over a decade, teams are reassessing their AppSec toolchain, with many large incumbents experiencing high churn. At the same time, disruptors leverage new technologies such as GenAI and reachability analysis to capture market share.
To better understand what is happening in the AppSec world, it is worth reviewing the origins of AppSec, the forces behind the ongoing transformation, and what lies ahead for AppSec.
The Application Security Engineer (AppSec Engineer) role emerged over the last few decades, primarily as a response to software applications’ increasing complexity and security needs. Specifically, the need for dedicated AppSec Engineers increased due to several key factors:
The creation and evolution of the Application Security Engineer role reflect the broader understanding that effective security must be baked into the application development process and continuously managed to help development teams ship secure software faster.
Over time, AppSec has faced challenges that have made it harder to stay true to its original goals. These challenges include:
We are in the middle of a generational shift in how software is written and delivered. GitHub Co-Pilot now has 1.8 million paid subscribers, growing 35% quarter over quarter. 92% of developers use AI coding tools, and 40% of submitted code is a direct output of AI tools. More AI-generated code means more attack surface area, higher throughput, and more strain on App Sec teams. This results in longer security review cycles and a lower percentage of major code changes that go through security review.
Attackers are increasingly targeting the application layer. Application vulnerabilities are the main reason for most recent breaches: eight out of the top ten data breaches in 2023 resulted from AppSec failures.
The software teams of the future will look radically different from the existing model. Several roles within SDLC are already experiencing unprecedented automation. For example, modern cloud platforms like Vercel and Netlify are transforming DevOps by automating code deployment and cloud configuration. Disruptive startups, such as Meticulous, are automating user testing and QA. Companies have eliminated or significantly reduced roles such as scrum masters and middle management. AppSec is slower in joining this transformation wave because of its hyper-specialization and the need to understand business logic. However, LLMs provide radically new ways to interact with the code base and the unstructured data. What was once unimaginable is now within the realm of possibility with the use of LLMs and techniques such as RAG, chain-of-thought, and multi-modal reasoning.
Within AppSec tools, we are seeing a few emerging trends.
The current generation of code scanners was first introduced in the mid-to-late 2010s. During this time, tools like Snyk and Semgrep offered new workflows (Shift Left, developer-driven security) and customized rules to reduce the time to identify vulnerabilities and alert developers earlier in the SDLC. However, tool setup and configuration are major obstacles to implementing AppSec tools. Some tools like Semgrep and CodeQL that are based on rule sets require considerable effort to set up and maintain. The new generation of code scanners focuses on reducing false positives, one of the biggest pain points for AppSec tools. Notable startups in this space are:
Theoretically, there are 8 different types of code scans that AppSec needs to run. To manage this complexity, a new crop of startups and tools has been growing that integrates all aspects of code scanning and AppSec data under one app. These tools are called Application Security Posture Management (ASPM) and have grown exponentially since 2022. Notable startups in this space are Ox Security, Apiiro, Aikido and Legit Security. Incumbents such as Snyk have also entered this space too, but have had mixed results trying to enter new scanning territories while building out their point products
The most cutting-edge startups in the AppSec world are leveraging AI and ML to automate some aspects of AppSec. Within this group, there are two classes of products:
One of the major reasons for the high rate of false positives in AppSec tools is the lack of business context. The missing business context can be traced to:
The missing link between the business context and security is the threat model. A threat model enables informed decision-making about vulnerabilities and a prioritized list of security improvements to the application’s design and implementation. Furthermore, as vulnerability scanning gets closer to developers, application security teams will spend more time on threat modeling and architecture review.
The threat model is often used as input for developers and AppSec engineers to filter out false positives and prioritize vulnerabilities. As AppSec tools grow in their ability to ingest natural language, the threat model can used as input for AppSec tools to reduce false positives, improve signal-to-noise ratio, and act as a decision tool for autonomous agents or humans.
AI can streamline the threat modeling process by automatically generating threat models based on the application’s architecture, codebase, and unstructured data. It can automatically update threat models, creating a living and dynamic threat model. This saves companies hundreds of thousands of dollars annually spent on third-party consultants and tooling for threat modeling. It can potentially disrupt a $2 Billion market and bring billions of dollars of productivity gains for enterprises.
Agentic AI offers a unique opportunity to automate AppSec operations, including threat modeling, design evaluation, and feedback. Frameworks such as Autogen, AutoGen Studio, and Crew AI provide the foundation for building such agents. These agents have already demonstrated the ability to do threat modeling. However, commercializing this concept requires a significant amount of effort in building workflows to capture, organize, and process information from multiple sources.
AppSec has come a long way from the early days of miscellaneous scripts cobbled together by security engineers. Nowadays, companies use tens of different products to run their AppSec programs, from code scanners to vulnerability management tools. Along the way, some of these tools have seen incremental improvements, resulting in more streamlined workflows and customized security tests. However, the level of effort and expertise to run these tools has increased with the increase in customization, resulting in a higher overhead for AppSec teams to configure and run AppSec tools. With the AI-driven transformation in software development practices and the rise of AI copilots, AppSec teams face new challenges and must keep up with the increased code velocity.
The traditional AppSec tools are built for a different time and cannot directly migrate to the new AI era. AI has the power to transform AppSec along these dimensions:
I want to thank James Berthoty of Latio for his thoughtful review of the drafts of this article. I also want to thank Ian Livingstone, Will Bengtson, Michael Coates, Frank Wang, and Yasir Ali for the great conversations that helped shape and validate various ideas in this article.