Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How to turn a USB flash drive into a portable games console

    Don’t buy a PCIe 5.0 SSD unless you say ‘Yes’ to these 3 questions

    Windows Recall is too risky for your PC. I can’t recommend it

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Blue-collar jobs are gaining popularity as AI threatens office work

      August 17, 2025

      Man who asked ChatGPT about cutting out salt from his diet was hospitalized with hallucinations

      August 15, 2025

      What happens when chatbots shape your reality? Concerns are growing online

      August 14, 2025

      Scientists want to prevent AI from going rogue by teaching it to be bad first

      August 8, 2025

      AI models may be accidentally (and secretly) learning each other’s bad behaviors

      July 30, 2025
    • Business

      Why Certified VMware Pros Are Driving the Future of IT

      August 24, 2025

      Murky Panda hackers exploit cloud trust to hack downstream customers

      August 23, 2025

      The rise of sovereign clouds: no data portability, no party

      August 20, 2025

      Israel is reportedly storing millions of Palestinian phone calls on Microsoft servers

      August 6, 2025

      AI site Perplexity uses “stealth tactics” to flout no-crawl edicts, Cloudflare says

      August 5, 2025
    • Crypto

      Chainlink (LINK) Price Uptrend Likely To Reverse as Charts Hint at Exhaustion

      August 31, 2025

      What to Expect From Solana in September

      August 31, 2025

      Bitcoin Risks Deeper Drop Toward $100,000 Amid Whale Rotation Into Ethereum

      August 31, 2025

      3 Altcoins Smart Money Are Buying During Market Pullback

      August 31, 2025

      Solana ETFs Move Closer to Approval as SEC Reviews Amended Filings

      August 31, 2025
    • Technology

      How to turn a USB flash drive into a portable games console

      August 31, 2025

      Don’t buy a PCIe 5.0 SSD unless you say ‘Yes’ to these 3 questions

      August 31, 2025

      Windows Recall is too risky for your PC. I can’t recommend it

      August 31, 2025

      Alienware’s 1440p ultrawide OLED gaming monitor is a huge 50% off

      August 31, 2025

      Clearance! This Asus OLED laptop with 16GB RAM is only $570

      August 31, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Is it time to rethink the OWASP Top 10?
    Technology

    Is it time to rethink the OWASP Top 10?

    TechAiVerseBy TechAiVerseJuly 28, 2025No Comments7 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Is it time to rethink the OWASP Top 10?
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    BMI Calculator – Check your Body Mass Index for free!

    Is it time to rethink the OWASP Top 10?

    The OWASP Top 10 serves as a key reference point for developers and security professionals, but with a new iteration on the horizon, we need to confront a hard truth: has it lost its effectiveness, or have we failed to implement it meaningfully?

    By

    • Tim Mackey, Black Duck

    Published: 23 Jul 2025

    The Open Worldwide Application Security Project (OWASP) has earned a reputation as a trusted authority in application security. Its most widely recognised contribution, the OWASP Top 10, serves as a key reference point for developers and security professionals, outlining the most prevalent web application risks. Since its debut, it has been championed as a foundational resource for secure software development. But with a new iteration on the horizon, we need to confront a hard truth: has the OWASP Top 10 lost its effectiveness, or have we failed to implement it meaningfully?

    There’s no denying that the OWASP Top 10 plays a valuable role in raising awareness. However, the persistent presence of the same vulnerabilities over multiple editions, such as injection attacks, cross-site scripting (XSS), authentication weaknesses, and misconfigurations raises concerns. Despite being widely known, these issues continue to plague software development. The growing number of vulnerabilities recorded each year in the CVE database underscores this worrying trend. Instead of seeing improvement, we’ve normalised many of these flaws. So, why does meaningful progress remain elusive?

    What is holding back the OWASP Top 10?

    In my view, three core issues are preventing the OWASP Top 10 from driving real change: developers often lack environmental context, security education is diminishing, and the list itself isn’t easily actionable.

    1. Developers don’t have the right context

    Today’s developers typically work within defined user stories and are primarily assessed based on feature delivery rather than security considerations. Frequently, they lack insight into how their code will function in real-world scenarios. Is it part of a financial service? A public-facing app? Or something more sensitive, like a healthcare platform? Context is easy to have when software is created only for specific products, or for use within the four walls of a company.

    But when context goes missing developers are left to make assumptions that can inadvertently introduce risk. The problem is compounded by how the industry treats developer roles: assuming uniform knowledge levels by job title, when in reality, training and experience vary significantly. This is especially problematic in an era where AI-generated code is on the rise. If that code is informed by insecure patterns, or if developers aren’t equipped to spot potential dangers, the risks multiply.

    Think about this: when code is reused across SDKs, APIs, or open-source packages, or after a company acquisition, the original developer’s awareness of how the code will be used often disappears. The further removed a developer is from the end-use, the harder it is to factor in the appropriate security measures.

    2. Security education is declining

    Awareness doesn’t equal understanding. And understanding doesn’t happen without proper education.

    According to the latest Building Security in Maturity Model (BSIMM) Report, now in its 15th edition, security awareness training in organisations has dropped by nearly 50% since 2008. This is particularly alarming given the expanding attack surface, rising threat sophistication, and tightening regulatory requirements.

    One-off security presentations or circulating documents aren’t sufficient. Developers need continuous, practical training that aligns with the environments and technologies they work in. Without it, the OWASP Top 10 risks becoming a check-the-box exercise rather than a catalyst for secure development.

    3. A list without action

    Raising awareness is only one part of the solution. Without the tools and processes to act on that knowledge, the OWASP Top 10 remains passive. It outlines risks but lacks built-in remediation advice, prioritisation frameworks, or mechanisms for accountability. As a result, both developers and security teams may regard it as someone else’s responsibility. Static lists don’t inspire dynamic change unless there’s an ecosystem in place to operationalise them.

    Software security goes beyond web apps

    Another key limitation of the OWASP Top 10 is its narrow focus on web applications. In today’s digital landscape, applications span far more than the web; they include mobile platforms, APIs, embedded systems, and cloud-native architectures.

    To gain a broader and more relevant perspective, it’s worth turning to resources like MITRE’s CWE Top 25, which highlights platform-independent software weaknesses based on how frequently they’re exploited and the severity of their impact.

    Here’s a telling stat: 40% of the vulnerabilities in the 2024 CWE Top 25 aren’t reflected in the OWASP Top 10 at all. One of the most frequently exploited issues, CWE-787, an out-of-bounds write, is completely absent. That’s because OWASP focuses on web vulnerabilities, while CWE considers the full software ecosystem. This disconnect fosters a piecemeal view of security and can leave significant blind spots.

    The age of accountability has arrived

    Where application security once emphasised raising awareness, regulatory forces are now ushering in a new era of enforcement. For example, the EU’s Digital Operational Resilience Act (DORA), effective from January 2025, imposes rigorous standards for financial institutions, including mandates for incident response and third-party risk assessments. Compliance is no longer a choice.

    Looking ahead, the Cyber Resilience Act (CRA), scheduled for enforcement in 2027, will introduce mandatory security obligations for all connected hardware and software sold in the EU. The penalties for non-compliance are substantial enough to capture board-level attention.

    These regulations represent a clear evolution from recommendation to obligation. Companies that fail to build proactive security programs will lose market trust and ultimately, relevance.

    Taking action: What should happen now

    If your security strategy relies solely on the OWASP Top 10, it’s time to expand your approach. Use it as a launchpad, not a destination. Pair it with more comprehensive resources like the CWE Top 25 to capture a fuller picture of modern threats.

    Equip developers with both authority and tools. Integrate secure development into CI/CD pipelines. Provide immediate security feedback during development, not just post-deployment. Make security integral to product completion, not an afterthought.

    Training also needs to evolve. Developers require contextual education tailored to their environments, tech stacks, and business risks. Generalised courses won’t cut it.

    Additionally, measure your program against real-world data. Resources like the BSIMM Report reveal what successful organisations are doing. Use these insights to benchmark and continuously improve your practices.

    Finally, create clear lines of accountability. Make security metrics part of regular reviews. Link them to incentives. Because when security becomes part of the core business process, sustainable change becomes possible.

    In conclusion

    We’ve been confronting the same vulnerabilities in the OWASP Top 10 for over 15 years. During that time, we’ve seen enormous innovation, from cloud computing to artificial intelligence, yet we’re still undermined by familiar flaws like injection bugs and broken authentication.

    So perhaps the issue isn’t whether the OWASP Top 10 has failed. The real question is: why haven’t we taken greater action based on what we already know?

    Tim Mackey is head of software supply chain risk at Black Duck.

    Read more on Application security and coding requirements


    • How to conduct an API risk assessment and improve security

      By: Paul Kirvan


    • Open Web Application Security Project (OWASP)

      By: Peter Loshin


    • application security

      By: Peter Loshin


    • Failings in open source disclosure put users at risk

      By: Cliff Saran

    BMI Calculator – Check your Body Mass Index for free!

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleEveryone’s a loser in Trump’s AI Action Plan
    Next Article WhatsApp is refused right to intervene in Apple legal action on encryption ‘backdoors’
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    How to turn a USB flash drive into a portable games console

    August 31, 2025

    Don’t buy a PCIe 5.0 SSD unless you say ‘Yes’ to these 3 questions

    August 31, 2025

    Windows Recall is too risky for your PC. I can’t recommend it

    August 31, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025168 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202548 Views

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202530 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202528 Views
    Don't Miss
    Technology August 31, 2025

    How to turn a USB flash drive into a portable games console

    How to turn a USB flash drive into a portable games console Image: Chris Hoffman…

    Don’t buy a PCIe 5.0 SSD unless you say ‘Yes’ to these 3 questions

    Windows Recall is too risky for your PC. I can’t recommend it

    Alienware’s 1440p ultrawide OLED gaming monitor is a huge 50% off

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    How to turn a USB flash drive into a portable games console

    August 31, 20252 Views

    Don’t buy a PCIe 5.0 SSD unless you say ‘Yes’ to these 3 questions

    August 31, 20250 Views

    Windows Recall is too risky for your PC. I can’t recommend it

    August 31, 20252 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.