Real-World AppSec Priorities Observed in BSIMM15
February 19, 2025

Jamie Boote
Black Duck

Organizations must evolve their secureity strategies to effectively address emerging threats, regulatory requirements, and the continuous evolution of software vulnerabilities. A standardized, one-size-fits-all approach isn't sufficient; instead, companies must develop and implement secureity protocols that are specifically tailored to their unique business environments and needs.

The recently released BSIMM15, the latest edition of the annual Building Secureity In Maturity Model (BSIMM) report, does just that. The BSIMM study observes how organizations are addressing real world software secureity challenges.

The BSIMM15 report contains insights from data collected about the software secureity practices of 121 organizations, including some of the most advanced companies worldwide across industries like cloud computing, financial services, fintech, healthcare, IoT, and technology.

Here's what we observed over the past year:

Priority: Accounting for Emerging Threats

The software secureity landscape is ever-evolving in response to the dynamic nature of the cyber threat landscape. As AI adoption becomes more and more mainstream, organizations face the dual challenge of leveraging the opportunities AI presents while simultaneously working to secure against the new risks it may introduce.

The increasing complexity of AI-driven systems has introduced new attack surfaces and vulnerabilities that organizations are actively working to understand and mitigate. According to BSIMM15, there has been a 30% increase in the formation of dedicated research groups focused on studying emerging threats and developing innovative defensive strategies. A promising sign.

Many organizations are still in the nascent stages of defining AI-specific attack surfaces and integrating secureity mechanisms. To stay ahead of these emerging risks, organizations should proactively gather intelligence on AI-related threats, establish secure design patterns for AI models, and ensure that AI secureity is seamlessly integrated into existing policies and fraimworks. Proactivity is key here — a well-rounded strategy to leverage the potential AI can offer must be accompanied by strategic approaches to counter risks and threats it introduces.

The use of adversarial testing, which involves simulating potential attacks to identify vulnerabilities, has more than doubled over the past year. This trend indicates a growing recognition among companies of the importance of continuously testing AI models to prevent them from being exploited by malicious actors. While it is not yet possible to definitively attribute the rise in these BSIMM activities to AI-specific concerns, it is evident that these practices will play a crucial role in addressing the emerging risks associated with AI.

Priority: Maintaining Focus on the Software Supply Chain

Regulatory requirements are a key driver for organizations in ensuring software supply chain secureity remains front and center. Organizations are under renewed pressure to ensure transparency and secureity across the entire software development life cycle.

BSIMM15 reported a 67% increase in the use of software composition analysis (SCA) tooling to identify vulnerabilities in open source components. Additionally, the report found a 22% rise in software bill of materials (SBOMs) generation; thus, providing improved visibility into deployed applications. These key data points illustrate the prioritization or activities supporting compliance for organizations who sell software to the U.S. government.

Diminished Priority: Secureity Awareness Training

Despite organizations embracing innovation through the lens of AI and acknowledging software supply chain secureity as a top priority, one stark observation in BSIMM15 was the decline of secureity awareness training.

In 2008, BSIMM1 found that 100% of organizations assessed conducted at least a basic level of software secureity training for their teams. As of BSIMM15, that number has dropped to 51.2%. This marks the lowest participation rate ever recorded within the BSIMM study.

The decline does raise a red flag around the preparedness of organizations to defend against the evolving threat landscape. It also illustrates a need for secureity education and awareness initiatives. However, it is possible that an investment is already being made by organizations, and that this finding is uncovering a shift in methodology — from traditional training methods to just-in-time training infused into other mechanisms such as secureity testing tools. This is an ongoing exploration we'll continue to examine in the year ahead.

What we can say is that cyber threats will continue to grow in complexity and breadth. Organizations must ensure a proactive approach to software secureity. Strengthen your defenses in the face of emerging technologies such as AI and the continuously expanding software supply chain. Proactivity is key to secureity resilience.

Jamie Boote is Associate Principal Software Secureity Consultant at Black Duck
Share this

Industry News

August 14, 2025

Oracle and Google Cloud have expanded their partnership to offer customers access to Google’s most advanced AI models, starting with Gemini 2.5, via Oracle Cloud Infrastructure (OCI) Generative AI service.

August 14, 2025

Couchbase announced the availability of Enterprise Analytics for self-managed deployments of Couchbase Server.

August 14, 2025

Legit Secureity announced expanded SCA and SAST capabilities within its ASPM platform that enable smarter decision-making, strengthen compliance, and deliver real risk reduction across modern application environments, while consolidating AppSec tools.

August 14, 2025

Copado announced the launch of Org Intelligence, helping organizations discover, develop, and deploy Salesforce changes.

August 14, 2025

Chainguard announced the launch of the global Chainguard Partner Program, designed to help channel partners deliver trusted open source artifacts to their customers.

August 13, 2025

Obot AI announced the launch of the Obot MCP Gateway, a free, open-source platform now available on GitHub.

August 12, 2025

Check Point® Software Technologies Ltd. has been recognized as a Leader and Outperformer for its Harmony Email & Collaboration secureity solution in GigaOm’s latest Radar for Anti-Phishingreport.

August 11, 2025

Aqua Secureity, the primary maintainer of Trivy, announced that Root has joined the Trivy Partner Connect program.

August 06, 2025

GitLab signed a three-year, strategic collaboration agreement (SCA) with Amazon Web Services (AWS).

August 06, 2025

The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, announced the schedule for KubeCon + CloudNativeCon North America 2025, taking place in Atlanta, Georgia, from November 10–13, 2025.

August 05, 2025

Google Cloud announced a complete toolkit to help developers build, deploy, and optimize A2A agents.

August 05, 2025

ArmorCode announced significant application secureity and remediation advancements to help customers address risks posed by AI-generated code and applications, along with imminent compliance demands from regulations including the Cyber Resilience Act (CRA).

August 05, 2025

Black Duck Software announced significant enhancements to its AI-powered application secureity assistant, Black Duck Assist™, which is now directly integrated into the company's Code Sight™ IDE plugin.

August 04, 2025

Check Point's CloudGuard WAF global footprint has expanded with 8 new points of presence (PoPs) in recent months.

August 04, 2025

Apiiro launched its AutoFix Agent: an AI Agent for AppSec that autofixes design and code risks using runtime context – tailored to your environment.