- 0
- 0
- 约4.85万字
- 约 36页
- 2026-02-10 发布于浙江
- 举报
2025STATEOF
ANEWVIEWOFMATURITY
2025STATEOFSOFTWARESECURITY:ANEWVIEWOFMATURITY
Contents
03OpeningLetter
04ExecutiveSummary
KeyFindings
07
15YearsofSpecialSoSS
09
StateofSoftwareSecurityin2025
FindingFlawsFixingFlaws
FightingDebt
19
ComparingSoftwareSecurityProgramPerformance
FlawPrevalenceFixCapacity
FixSpeed
DebtPrevalenceOpen-SourceDebt
31
ConclusionsRecommendations
34Methodology
2
2025STATEOFSOFTWARESECURITY:ANEWVIEWOFMATURITY
Opening
letter
Ourresearchdrivesourownsoftwaresecuritymeasures,andthisyear,inour15thvolumeofthisreport,weseektodiscovertrendsaboutwherethemostriskresidesandwhatmetricscanbeusedtogaugeprogressagainstit.Plus,wewanttocompareprogramperformanceofleadingandlaggingorganizationsusingthesemetrics.Thegapsbetweenthetop25%andbottom25%arefascinating.
Ultimately,realizingprogressandmaturityinsoftwaresecurityrequiresarisk-basedperspective.Ittakesfocusingonthedownsiderisksthatmatterinyourcontextandtheactionsthatcreatecontinuousfeedbackloopstoseeandremediateriskinanongoingfashion.
Thisiseasiersaidthandone,sowehopeyoufindtheinsightsandguidanceinthisreportashelpfulaswehaveforimprovingsecurityposturebyadaptivelysecuringmission-criticalsoftwareintheartificialintelligence(AI)era.
Sincerely,
NielsTanisSeniorPrincipal
SecurityResearcher
SohailIqbalChiefInformationSecurityOfficer
ChrisWysopalChiefSecurityEvangelist
3
2025STATEOFSOFTWARESECURITY:ANEWVIEWOFMATURITY
Executive
Summary
4
2025STATEOFSOFTWARESECURITY:ANEWVIEWOFMATURITY
Iwontsay
ImusingAItogeneratecode…
In2025,organizationsfaceincreasingthreatstotheirsoftware.Theexploitationofvulnerabilitiesasthecriticalpathtoinitiateabreach“almosttripled(180%increase)
inthelastyear,”accordingtotheVerizon2024DataBreachInvestigationsReport.
Meanwhil
您可能关注的文档
- SpyCloud:2024年度身份暴露报告 英文版 .docx
- STAR Enabled Solutions FAQ - 020123信息安全资料 .docx
- STAR Program Overview信息安全资料 .docx
- STAR Registry FAQ信息安全资料 .docx
- T∕CSAE 211-2021 智能网联汽车数据共享安全要求 .docx
- T∕SXQCTB 001-2023 汽车制造工业控制系统信息安全技术规范 .docx
- TDSAG 004-2025 广东省政务云应用系统上线前风险评估指引 .docx
- the-essential-guide-to-ueba信息安全资料 .docx
- Threat Hunting with Splunk信息安全资料 .docx
原创力文档

文档评论(0)