What security practices do 300,000 developers really do?
What security practices do 300,000 developers really do?
![](https://cdn.prod.website-files.com/5fec9210c1841a6c20c6ce81/6022b7742d799482d433d167_5fb34cc491a9af3646a2dc18_ManyFaces.webp)
![](https://cdn.prod.website-files.com/5fec9210c1841a6c20c6ce81/6022b7742d799482d433d167_5fb34cc491a9af3646a2dc18_ManyFaces.webp)
BSIMM 8 is out! Fantastic. The one and only large-scale study on what security practices large organizations put in place to produce secure software.
The study is carried out by application security professionals under the supervision of Gary McGraw, making sure the gathered data is consistent, accurate and gives an insight into what 300,000 developers do on a day-to-day basis.In my latest presentation, I reference BSIMM numbers where I mention that on average, there are 2 application security professional per 100 developers.
However, that hasn't been the case since BSIMM4. BSIMM8 reports that this number is even less, now at 1.6 per 100 developers. Hiring more application security professionals will simply not work as there is a shortage of talent. More than ever, we need to give the developers the tools and the training to write secure code that is hands-on, readily available and scalable for organisations.
The report also shows that the most common activity in the Training practice is providing an awareness training to all employees at 67%. I started mapping what we do at Secure Code Warrior (SCW) in the Training practice and realized that our solution can tick off all the 12 activities in the Training practice ranging from level 1 (most companies do it) to level 3 (very few companies do it).
One single solution that can be used to cover an entire practice!Out of the 12 training practices, the most interesting practices for the Secure Code Warrior solution are:
- Level 1: Provide awareness training
- Level 1: Deliver on-demand individual training
- Level 2: Enhance satellite through training (SCW metrics)
- Level 3: Reward progression through curriculum (SCW badges)
- Level 3: Provide training for vendors or outsourced workers (SCW Assessments)
- Level 3: Host external software security events (SCW Tournament mode)
- Level 3: Identify satellite through training (SCW metrics)
Are you confident that your current solution addresses these practices?
Resources to get you started
Trust Agent by Secure Code Warrior
Discover SCW Trust Agent, an innovative solution designed to enhance security by aligning developer secure code knowledge and skills with the work they commit. It provides comprehensive visibility and controls across an organization's entire code repository, analyzing each commit against developers' secure code profiles. With SCW Trust Agent, organizations can strengthen their security posture, optimize development lifecycles, and scale developer-driven security.
Resources to get you started
Women in Security are Winning: How the AWSN is Setting Up a New Generation of Security Superwomen
Secure-by-Design is the latest initiative on everyone’s lips, and the Australian government, collaborating with CISA at the highest levels of global governance, is guiding a higher standard of software quality and security from vendors.
Women in Security are Winning: How the AWSN is Setting Up a New Generation of Security Superwomen
Secure-by-Design is the latest initiative on everyone’s lips, and the Australian government, collaborating with CISA at the highest levels of global governance, is guiding a higher standard of software quality and security from vendors.
SCW Trust Agent - Visibility and Control to Scale Developer Driven Security
SCW Trust Agent, introduced by Secure Code Warrior, offers security leaders the visibility and control needed to scale developer-driven security within organizations. By connecting to code repositories, it assesses code commit metadata, inspects developers, programming languages used, and shipment timestamps to determine developers' security knowledge.
What security practices do 300,000 developers really do?
![](https://cdn.prod.website-files.com/5fec9210c1841a6c20c6ce81/6022b7742d799482d433d167_5fb34cc491a9af3646a2dc18_ManyFaces.webp)
BSIMM 8 is out! Fantastic. The one and only large-scale study on what security practices large organizations put in place to produce secure software.
The study is carried out by application security professionals under the supervision of Gary McGraw, making sure the gathered data is consistent, accurate and gives an insight into what 300,000 developers do on a day-to-day basis.In my latest presentation, I reference BSIMM numbers where I mention that on average, there are 2 application security professional per 100 developers.
However, that hasn't been the case since BSIMM4. BSIMM8 reports that this number is even less, now at 1.6 per 100 developers. Hiring more application security professionals will simply not work as there is a shortage of talent. More than ever, we need to give the developers the tools and the training to write secure code that is hands-on, readily available and scalable for organisations.
The report also shows that the most common activity in the Training practice is providing an awareness training to all employees at 67%. I started mapping what we do at Secure Code Warrior (SCW) in the Training practice and realized that our solution can tick off all the 12 activities in the Training practice ranging from level 1 (most companies do it) to level 3 (very few companies do it).
One single solution that can be used to cover an entire practice!Out of the 12 training practices, the most interesting practices for the Secure Code Warrior solution are:
- Level 1: Provide awareness training
- Level 1: Deliver on-demand individual training
- Level 2: Enhance satellite through training (SCW metrics)
- Level 3: Reward progression through curriculum (SCW badges)
- Level 3: Provide training for vendors or outsourced workers (SCW Assessments)
- Level 3: Host external software security events (SCW Tournament mode)
- Level 3: Identify satellite through training (SCW metrics)
Are you confident that your current solution addresses these practices?
Resources to get you started
Women in Security are Winning: How the AWSN is Setting Up a New Generation of Security Superwomen
Secure-by-Design is the latest initiative on everyone’s lips, and the Australian government, collaborating with CISA at the highest levels of global governance, is guiding a higher standard of software quality and security from vendors.
SCW Trust Agent - Visibility and Control to Scale Developer Driven Security
SCW Trust Agent, introduced by Secure Code Warrior, offers security leaders the visibility and control needed to scale developer-driven security within organizations. By connecting to code repositories, it assesses code commit metadata, inspects developers, programming languages used, and shipment timestamps to determine developers' security knowledge.
Trust Agent by Secure Code Warrior
Discover SCW Trust Agent, an innovative solution designed to enhance security by aligning developer secure code knowledge and skills with the work they commit. It provides comprehensive visibility and controls across an organization's entire code repository, analyzing each commit against developers' secure code profiles. With SCW Trust Agent, organizations can strengthen their security posture, optimize development lifecycles, and scale developer-driven security.