A Quarterly interactive e-book publication of primary research findings conducted for Security Compass. The report quantifies the challenges and opportunities being confronted by US government agencies at the federal, state and local levels. Software development methods, security expertise, developer controls and mitigations, communication approaches, and current approaches to ATO compliant software development are explored.
In today’s cybersecurity landscape,threat modeling plays a critical role in identifying, assessing, and mitigating
potential security vulnerabilities in software systems. This evidence-based research explores the current state
ofthreat modeling and the challenges organizations face while scaling the process for applications they build
What follows are highlights from primary research studies Security Compass commissioned in 2022 on topics in cybersecurity, covering Developer Perspectives on Application Development, DevSecOps Perspectives on AppSec Training, and Application Security in the Mid-Market.
The research was conducted independently by Golfdale Consulting, Inc.
Given the importance that eLearning plays in developing secure software, this ebook provides an overview of our research into AppSec training approaches. Findings include “deep dives” into budgeting, training challenges, time consuming elements, how best to reinforce AppSec eLearning, and the value of accreditation to individual contributors, managers, and organizations.
Most developers involved in product builds believe their companies to have a mature security posture but nonetheless struggle to keep up to date with growing regulations and compliance requirements. On the cybersecurity front, developers view automated modeling, integration with other tools, and matching the speed of new threats that emerge as all highly important. Security must start with design and remain a critical element at each stage of the SDLC.
Over 90% of mid-market companies that develop software are interested in solutions that automate proactive security and compliance processes.
Companies looking to accelerate their software development in tandem with stronger cybersecurity compliance measures are looking to just-in-time training (JITT) for their software developers and automated built-to-purpose cybersecurity software for accomplishing these goals.
The report quantifies the challenges and opportunities being confronted by US government agencies at the federal, state and local levels. Software development methods, security expertise, developer controls and mitigations, communication approaches, and current approaches to ATO compliant software development are explored.