Emerging Software Security Risks: How Are Tech Leaders Preparing for 2024?

About this report

Data collection: Sep 3 - Sep 20, 2023

Respondents: 125 software engineering and information security leaders who are informed about sources of software security risk for their organization

Software security vulnerabilities can arise from a variety of sources — especially those related to emerging tech. Read on to find out which potential risks are most concerning to tech leaders.

One minute insights:

  • lock iconAround half of leaders experienced software-related security issues during the past six months
  • Closing tag html circle iconThe most common sources of security issues were open source software, purchased software and legacy code
  • Warning sign iconOpen source code is viewed by many as a potential risk source, and organizations use vulnerability assessments (VAs) to gauge their risk exposure
  • Improvement arrow graph iconMany plan to increase the resources allocated to protecting against software security risks
  • Thumbs Up icon handTech leaders feel informed about emerging risks and are confident they can protect against them

Around half of leaders experienced software-related security issues recently, often due to open source code

During the past six months, did your organization experience a security issue(s) related to software?

During the past six months, did your organization experience a security issue(s) related to software?

52% of all respondent organizations (n = 125) experienced a software-related security issue within the past six months.

n = 125

Among respondents whose organizations experienced a recent software-related security issue (n = 65), open source code (42%), code in purchased tools (40%) and legacy code (38%) were common sources.

Only 12% identified AI-generated code as the source of their recent security issue.

Thinking of the software-related security issue your organization experienced, where did the vulnerability occur (i.e., what was the entry point)? Select all that apply.

Thinking of the software-related security issue your organization experienced, where did the vulnerability occur (i.e., what was the entry point)? Select all that apply.

Acquired code from a recent merger/acquisition 11% | Can’t say 9% | Don’t know 2% | Other 0%

Question shown only to respondents who answered “Yes” to “During the past six months, did your organization experience a security issue(s) related to software?”

Nearly all (91%) of those respondent organizations (n = 65) have taken steps to improve their software security practices as a result of their recent experience. 8% plan to improve their security posture, but haven’t yet done so.

Did your organization take steps to improve software security practices after that issue(s)?

Did your organization take steps to improve software security practices after that issue(s)?

Don’t know 0% | Can’t say 0%

n = 65

Question shown only to respondents who answered “Yes” to “During the past six months, did your organization experience a security issue(s) related to software?”

Note: May not add up to 100% due to rounding

lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals

Question: In your view, what is the most important thing to remember about protecting against future software security risks?

Most issues happen due to internal hygiene. If we can emphasize more on that, we are mostly covered.

VP, finance industry, 1,000 - 5,000 employees

Always predict for variability in open source packages that have a massive adoption, like the JavaScript packages that have gone rogue recently.

C-suite, educational services industry, <1,000 employees

For many, open source code is a potential risk source; organizations use VAs to gauge their risk exposure

Many respondents (n = 125) anticipate that open source code (54%) or legacy code (43%) will present the most significant software security risks to their organization in the next six months.

Other anticipated risk sources include AI-generated code (39%) and code included in purchased tools/solutions (38%).

Thinking ahead: In the next six months, what code source(s) do you anticipate will present the most significant software security risks to your organization? Select up to three.

Thinking ahead: In the next six months, what code source(s) do you anticipate will present the most significant software security risks to your organization? Select up to three.

Code that is part of a purchased tool/solution 38% | Proprietary code 30% | Acquired code from a new merger/acquisition 20% | Can’t say 7% | Don’t know 2% | Other 0%

n = 125

70% of respondent organizations use VAs to gauge software security risk. Static code analysis (60%) and monitoring and observability (54%) are also common practices.

What process(es) does your organization currently use to assess software security risk? Select all that apply.

What process(es) does your organization currently use to assess software security risk? Select all that apply.

Static application security testing (SAST) 31% | Software supply chain management (e.g., requiring software bills of material) 25% | Software composition analysis (SCA) 22% | Mobile application security testing (MAST) 18% | Interactive application security testing (IAST) 17% | Risk scoring system 14% | Can’t say 6% | Don’t know 1% | Other 0%

In the next six months, 66% of respondent organizations plan to increase the level of investment allocated to assessing software security risk. 23% plan to keep their investment level the same.

In the next six months, does your organization plan to increase or decrease the level of investment (i.e., time, staff, tools) allocated to software security risk assessment?

In the next six months, does your organization plan to increase or decrease the level of investment (i.e., time, staff, tools) allocated to software security risk assessment?

Significantly decrease 0%

n = 125

Question: In your view, what is the most important thing to remember about protecting against future software security risks?

Never assume you are done with security. It is a continuous activity.

Director, software industry, 10,000+ employees

Don’t trust code; verify it to the best of your abilities. Tools exist to help this, but you [must] always be thinking about security, not just of software, but of deployment chains and deployment stacks.

C-suite, professional services industry, <1,000 employees

Tech leaders feel informed about emerging software security risks and are confident they can protect against them

How informed do you feel about emerging software security risks?

How informed do you feel about emerging software security risks?

95% of respondents feel informed about emerging risks to software security.

n = 125

Note: May not add up to 100% due to rounding

Does your organization have security policies in place regulating the use of emergent technology and/or tools (e.g., generative AI coding tools)?

Does your organization have security policies in place regulating the use of emergent technology and/or tools (e.g., generative AI coding tools)?

60% of respondent organizations have security policies in place that regulate the use of emergent tech such as generative AI coding tools. 21% don’t have policies yet, but plan to implement them.

n = 125

92% of respondents feel confident in their organization's ability to protect against software security risks in the next six months.

How confident are you in your organization’s ability to protect against software security risks in the next six months?

How confident are you in your organization’s ability to protect against software security risks in the next six months?

Too early to tell 0%

n = 125

Question: In your view, what is the most important thing to remember about protecting against future software security risks?

The future landscape of software security risk is still unpredictable due to [the] acceleration of AI tools on both sides of the equation.

Director, manufacturing industry, 1,000 - 5,000 employees

Software security vulnerabilities are increasing due to exposure to third party libraries used.

Director, software industry, <1,000 employees
A lightbulb

Want more insights like this from leaders like yourself?

Click here to explore the revamped, retooled and reimagined Gartner Peer Community. You'll get access to synthesized insights and engaging discussions from a community of your peers.

Respondent Breakdown

Screenshot 2023-11-29 at 12.33.32

Note: May not add up to 100% due to rounding.

Respondents: 125 software engineering and information security leaders who are informed about sources of software security risk for their organization