ZDNet AI→ original

Why Traditional Application Security No Longer Works

The find-and-fix model no longer works. AI assistants speed up development, CI/CD deploys code continuously, and the patch backlog is growing exponentially. Old

Why Traditional Application Security No Longer Works
Source: ZDNet AI. Collage: Hamidun News.
◐ Listen to article

The "find-and-fix" model for application security is breaking down. When developers write code with AI assistance, deploy updates every day, and the list of known vulnerabilities grows geometrically, the old approach simply drowns.

Why

Traditional AppSec Failed Traditional security relied on the ability to fix bugs found before the next release. But the world has changed. AI assistants like GitHub Copilot accelerate code writing, developers release multiple versions a day (thanks to CI/CD pipelines), and the number of known vulnerabilities (CVE) has grown several times over in the past couple of years. Development speed now outpaces the speed of finding and fixing problems. The problem intensifies exponentially: each CVE requires time for analysis, assessment, patch development, testing, version rollback. And new vulnerabilities are discovered every week. The queue grows faster than it can be processed.

The

Breaking Point Exponential CVE growth: each year brings more new vulnerabilities than the previous one. In 2023 alone, over 28 thousand CVEs were registered. Lagging patches: the queue for fixes is longer than humanity can process. The average delay between vulnerability discovery and patch release is months. AI faster than QA: generative models write code faster than it can be checked manually or even with automated tools. Endless dependency chain: a single vulnerability in a popular library compromises hundreds and thousands of applications, from mobile apps to critical infrastructure.

Shift

Left Companies are moving toward "shift-left"—embedding security checks in early development stages, right in the developer's IDE, rather than catching problems after production deployment. This means: static analysis (SAST) blocks unreliable code before merge, dependency checks catch CVEs in library versions, dynamic analysis (DAST) simulates attacks in test environments. But even this is often insufficient. Some companies are transitioning to automated incident response: if a vulnerability is found in production, an alert immediately rolls back or isolates the problematic code without human intervention. This reduces the vulnerability window from hours to minutes.

"Security can no longer be the final step in development.

It must be embedded in code from the first line."

A

New Contract Between Dev and Sec The old model was antagonistic: developers wrote fast, security engineers criticized later. The new model requires collaboration. Developers learn to think about security while writing code, security engineers embed themselves in teams and write automation instead of conducting manual checks.

What

It Means The era when AppSec teams sat with checklists and caught bugs during pentests is ending. The new reality—security is embedded in development, not layered on top. DevSecOps, not separate AppSec departments. Companies that don't reorient will lag in both speed and reliability.

ZK
Hamidun News
AI news without noise. Daily editorial selection from 400+ sources. A product by Zhemal Khamidun, Head of AI at Alpina Digital.
What do you think?
Loading comments…