Unveiling the State of Application Security Workflows 2025
As a former application security practitioner and now the CMO of Kodem Security, I’ve seen firsthand how the landscape of application security has evolved—and how it continues to challenge even the most prepared organizations.
When we set out to create the State of Application Security Workflows 2025, our goal was clear: to go beyond surface-level insights and uncover the deeper trends shaping how teams secure modern applications. This wasn’t just about identifying problems; it was about providing actionable strategies to help teams navigate the complexity of today’s AppSec workflows.


Why We Created This Report

In speaking with security leaders, CISOs, and application security practitioners across industries, one message came through loud and clear: the tools and processes we rely on aren’t keeping up with the demands of modern development and deployment pipelines.
Fragmentation, inefficiencies, and a lack of alignment between security and development are holding teams back. At Kodem, we wanted to understand these pain points better and provide a roadmap for addressing them.
To create this report, we surveyed a diverse group of security professionals:
- CISOs and Security Leaders: The leaders responsible for setting the security agenda
- Spplication security Practitioners: The hands-on experts grappling with day-to-day vulnerabilities.
- Developers and DevOps Teams: The frontlines of shift-left initiatives.
Our findings reflect the collective experience of teams across industries, from tech startups to global enterprises, grappling with everything from fragmented tools to the rapid adoption of cloud-native architectures.
What We Discovered
The data confirmed what many of us have suspected: the traditional approaches to application security aren’t enough.
Fragmentation is a Major Barrier
- 78% of teams use more than five tools in their application security stack, leading to inefficiencies and gaps in visibility.
One respondent summed it up: “ASPMs make sense, but they don’t solve the need for a unified platform. Organizations are still managing five different tools to ensure they don’t leave any gap.”
Remediation is Painfully Slow
- 62% of respondents said remediation is their biggest bottleneck.
- Critical vulnerabilities take weeks to fix, leaving organizations exposed.
The Metrics Are Changing
- 82% predict real-world exploitability scores will replace traditional CVSS metrics by 2025.
- This shift reflects the growing need to focus on risk in context, rather than generic severity scores.
Cloud-Native Workflows Need Rethinking
- 71% of teams say their current application security workflows aren’t suited to cloud-native environments.
- The move to ephemeral infrastructure and microservices demands new approaches to AppSec.
What’s Next for Application Security
This report isn’t just a snapshot of where we are—it’s a guide to where we need to go.
- Unified Workflows: Teams need platforms that integrate across the SDLC, bridging the gap between development and security.
- Real-World Context: Tools must go beyond scanning to provide actionable, context-aware insights that help teams prioritize effectively.
- Runtime Protection: As shift-left efforts mature, runtime security solutions will become essential to secure what gets deployed.
Your Next Step
This report is a call to action for all of us in the AppSec community. Whether you’re a security leader looking to align your strategy with business goals or a practitioner trying to keep pace with growing workloads, the insights and strategies in this report can help.
Download the State of Application Security Workflows 2025 and join the conversation.
At Kodem, we’re proud to be part of this evolving story, and we’re here to help you build a smarter, more resilient approach to application security.
What is blocking your AppSec workflow?
More blogs

From Discovery to Resolution: A Single Source of Truth for Vulnerability Statuses
Continuous visibility from first discovery to final resolution across code repositories and container images, showing who fixed each vulnerability, when it was resolved and how long closure took. Kodem turns issue statuses into ownership for engineers, progress tracking for leadership and defensible risk reduction for application security.

Kai Gets Internet Access: Turning Context Into Intelligence for Product Security Teams
For years, product security teams have lived with a gap. Tools surfaced findings — CVEs, outdated packages, risky dependencies — but rarely the context to make sense of them. Engineers still had to open a browser, type a CVE into Google, skim through NVD, vendor advisories, GitHub issues, and random blogs to answer basic questions: Is this actually exploitable in our environment? Is there a safe upgrade path? Has anyone seen this exploited in the wild? This release closes that gap.

When NPM Goes Rogue: The @ctrl/tinycolor Supply-Chain Attack
On September 15, 2025, researchers at StepSecurity and Socket disclosed a large, sophisticated supply-chain compromise in the NPM ecosystem. The incident centers around the popular package @ctrl/tinycolor (with over two million weekly downloads), but it extends far beyond: 40+ other packages across multiple maintainers were also compromised.
A Primer on Runtime Intelligence
See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.
Platform Overview Video
Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.
The State of the Application Security Workflow
This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.
.png)
Get real-time insights across the full stack…code, containers, OS, and memory
Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Stay up-to-date on Audit Nexus
A curated resource for the many updates to cybersecurity and AI risk regulations, frameworks, and standards.
