Connect with us

Innovation and Technology

The Hidden Costs Of Ignoring Application Security

Published

on

The Hidden Costs Of Ignoring Application Security

Introduction to Application Security in 2025

Application security has become a strategic issue, not just a technical one. But if the 2025 State of Application Security report is any indication, many organizations still haven’t adjusted. Most teams are overwhelmed, underfunded and often making high-stakes trade-offs without clear risk visibility.

According to the survey, 62% of organizations knowingly ship insecure code. Nearly 80% of security leaders worry that a breach could cost them their job. And perhaps most concerning, over half still wait until the end of the development cycle to involve security—if at all.

This isn’t a tooling problem. It’s a systemic one. It’s a cultural gap. And it’s leaving organizations exposed at a time when application-layer flaws account for 43% of breaches.

AppSec as a Strategic Risk

Software runs the business. Which means vulnerable software puts the business at risk. But while most companies acknowledge that risk, few are resourced to deal with it. Nearly 90% of teams allocate just 11–20% of their security budgets to application security—even as the average breach cost in the U.S. climbs to $9.48 million.

Steve Kosten, director of application security at Cypress Data Defense, calls this a reflection of the industry’s roots. “AppSec is the younger brother of network security,” he told me. “Most security leaders came up through infrastructure. They don’t blink when developers deploy 20 times a day—but they’d lose it if the network team made changes that often.”

The result is predictable: heavy spending on firewalls and perimeter tools, while code-level security remains an afterthought.

Security as a Bottleneck—Still

Here’s the irony: security is supposed to enable innovation. But for many teams, it still shows up too late—and slows things down.

I know I’m dating myself–but when I was a security architect at EDS 20 years ago, one of my responsibilities was to conduct a final security review before an application was cleared for release. The problem? By the time I got involved, the app had already been built. Months of work had been poured into it. So when I found a serious vulnerability, I had two choices: wave it through and hope for the best, or be the bad guy who forced a delay and triggered a costly round of rework.

Neither choice felt good. But that was 2005. What’s astonishing is that in 2025, this is still how many organizations operate. The data backs it up—only 36% of respondents say they involve security during the planning phase. A full 57% wait until right before deployment.

Kosten agrees. “Despite what’s been preached for years, application security is still viewed as a last-minute task,” he says. “As long as organizations lack secure development lifecycles, security issues will continue to show up late and delay releases.”

We’ve had two decades of DevOps, threat modeling and “shift left” evangelism, yet security is still bolted on at the end. And it’s still perceived as a hurdle instead of a partner.

A Culture of Trade-Offs

It’s tempting to see that 62% figure—organizations admitting to knowingly releasing insecure code—as an indictment. But Kosten offers a more nuanced view. “The real issue isn’t whether code ships with vulnerabilities. It’s whether organizations understand the risk they’re accepting,” he says.

He describes three types of organizations: those unaware they’re vulnerable (true failure), those reacting to issues without risk context (survival mode) and those that make informed trade-offs based on thorough risk assessment (success). “True failure occurs when organizations operate without understanding their security posture or the risks they’re accepting.”

Drowning in False Positives

Another key challenge: noise. According to the report, 58% of teams say they’re overwhelmed by false positives from scanning tools. That figure likely undercounts the problem. “Too often, security teams hand off raw scanner output to developers without validation,” Kosten notes. “That leads to two bad outcomes: developers ignoring real issues they don’t understand, or wasting time fixing non-existent problems.”

To address the noise, he suggests tuning tools to the application’s context, prioritizing real risk and considering external support. “Managed service providers who do this every day are often better equipped to validate results quickly and accurately,” he says.

Still Struggling with the Basics

Despite broad awareness, foundational issues like the OWASP Top 10 remain unresolved for nearly half of organizations. That’s not necessarily due to negligence. As Kosten points out, OWASP categories have grown broader and more complex over time. “Fixing entire classes of vulnerabilities isn’t trivial—especially for under-resourced teams.”

He also points to the misplaced view of security as a compliance requirement rather than a design principle. “When security is bolted on at the end to satisfy audit checkboxes, the result isn’t secure software. It’s duct tape.”

The Case for External Support

The report reveals that 83% of security professionals are open to outsourcing at least part of their AppSec program. That’s not a sign of failure—it’s a recognition that modern development cycles demand support beyond what most internal teams can manage.

Managed AppSec providers bring not just capacity but specialization—experience with tools, languages and threat models that change constantly. Kosten sees their value in complementing internal teams: “Let external partners handle validation and scanning. That frees up your team to focus on secure design and developer engagement.”

Where We Go from Here

Application security isn’t getting easier. AI-generated code is already introducing new vulnerabilities, and attack tactics are evolving just as fast. Most organizations aren’t scaling security teams to match.

But the fix isn’t more tools. It’s better integration. Better visibility. And a cultural shift that frames AppSec as a business enabler, not a roadblock.

We’ve been talking about “shifting left” for decades. Maybe this is the year we finally mean it.

Conclusion

The state of application security in 2025 is a complex and challenging issue. Organizations are struggling to keep up with the pace of development, and security teams are often overwhelmed and underfunded. However, by acknowledging the cultural gap and addressing the systemic issues, organizations can start to make progress. It’s time to shift the focus from security as a last-minute task to security as a design principle, and to recognize the value of external support in achieving this goal.

FAQs

Q: What is the current state of application security in 2025?
A: The current state of application security in 2025 is one of overwhelm and underfunding, with many organizations knowingly shipping insecure code and struggling to keep up with the pace of development.

Q: What is the main challenge facing security teams?
A: The main challenge facing security teams is the cultural gap between security and development, with security often being viewed as a last-minute task rather than a design principle.

Q: How can organizations address the issue of false positives?
A: Organizations can address the issue of false positives by tuning tools to the application’s context, prioritizing real risk, and considering external support.

Q: What is the value of external support in application security?
A: The value of external support in application security lies in the specialization and capacity that managed AppSec providers can bring, allowing internal teams to focus on secure design and developer engagement.

Q: What is the future of application security?
A: The future of application security will require a cultural shift, with security being framed as a business enabler rather than a roadblock. It will also require better integration, better visibility, and a recognition of the value of external support.

Advertisement

Our Newsletter

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Trending