<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Clover Security</title>
	<atom:link href="https://clover.security/feed/" rel="self" type="application/rss+xml" />
	<link>https://clover.security</link>
	<description>Design-Led Product Security</description>
	<lastBuildDate>Sat, 02 May 2026 05:44:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://clover.security/wp-content/uploads/2026/04/cropped-clover-logo-2048-32x32.png</url>
	<title>Clover Security</title>
	<link>https://clover.security</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Securing the Agentic SDLC</title>
		<link>https://clover.security/blog/securing-the-agentic-sdlc-clover-security/</link>
		
		<dc:creator><![CDATA[Alon Kollmann]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 12:26:28 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Agentic SDLC]]></category>
		<guid isPermaLink="false">https://clover.security/?p=1167</guid>

					<description><![CDATA[<p>The software development lifecycle as we've known it for the past two decades is being replaced, not incrementally, not gradually, but wholesale. In its place, a fundamentally new model is emerging: the Agentic SDLC.</p>
<p>The post <a rel="nofollow" href="https://clover.security/blog/securing-the-agentic-sdlc-clover-security/">Securing the Agentic SDLC</a> appeared first on <a rel="nofollow" href="https://clover.security">Clover Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The software development lifecycle as we&#8217;ve known it for the past two decades is being replaced, not incrementally, not gradually, but wholesale. In its place, a fundamentally new model is emerging: the Agentic SDLC.</p>



<p>If you lead security at any organization that ships software, you already know this is not just AI-assisted development but a structural transformation of how software gets built, one is fundamentally reshaping who writes the code, how it reaches production, and what a security review actually needs to cover. All at a pace where developers can now push hundreds of pull requests faster than your security team can review one.</p>



<p>Every transformation of this scale, from open source to cloud to DevOps, has been a defining moment for the security leaders who lived through it. The ones who called the shift early and redesigned their programs around it became the architects of how their companies built security for the next decade. The ones who waited spent that decade catching up. This transformation is no different, except that it is moving faster than any of their predecessors. Securing the Agentic SDLC is not just another item for the roadmap. It is a fundamental rethinking of security for the entire ecosystem, which will define our craft and success for the decade ahead.</p>



<h2 class="wp-block-heading">What is the Agentic SDLC?</h2>



<p>The traditional SDLC followed a familiar chain: requirements → design → implementation → testing → deployment → monitoring. Humans drove every stage. Code was the artifact of human thought, written line by line, reviewed by peers, and shipped through well-understood CI/CD pipelines.</p>



<p>The Agentic SDLC breaks that chain.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="1024" src="https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-01-1024x1024.png" alt="The Agentic SDLC" class="wp-image-1209" srcset="https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-01-1024x1024.png 1024w, https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-01-300x300.png 300w, https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-01-150x150.png 150w, https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-01-768x768.png 768w, https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-01-1536x1536.png 1536w, https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-01.png 1680w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">The Agentic SDLC</figcaption></figure>



<p>In this new model, engineering focus shifts to three core activities:</p>



<h3 class="wp-block-heading">1. Specifying intent, design, and architecture.</h3>



<p>The most critical work in software development is no longer writing code, it&#8217;s defining what to build and why. Engineers and product managers spend more time crafting specifications, defining system architecture, and articulating design intent than they spend on implementation. As Anthropic&#8217;s <a href="https://resources.anthropic.com/2026-agentic-coding-trends-report" target="_blank" rel="noreferrer noopener">report</a> notes, &#8220;human expertise focuses on defining the problems worth solving while AI handles the tactical work of implementation.&#8221;</p>



<h3 class="wp-block-heading">2. Manage context and tools.&nbsp;</h3>



<p>Developers now curate the context that agents operate within, and that curation is a craft in its own right. It starts with choosing the right model or agent for each task, defining how it operates, and selecting the tools it gets access to. It extends to configuring MCP servers, building Claude Skills, writing custom system prompts, and maintaining the knowledge infrastructure that lets agents make good decisions. The quality of the output is directly proportional to the quality of the context provided.</p>



<h3 class="wp-block-heading">3. Reviewing and validating massive volumes of agent output.&nbsp;</h3>



<p>When agents can work for hours or days autonomously, generating entire feature sets or even complete applications, the human role shifts from writing code to reviewing it, evaluating architectural choices, validating design decisions, and ensuring the system as a whole solves the right problems. Anthropic&#8217;s research reveals that while engineers use AI in roughly 60% of their work, they <a href="https://www.anthropic.com/research/how-ai-is-transforming-work-at-anthropic" target="_blank" rel="noreferrer noopener">can only &#8220;fully delegate&#8221; 0-20% of tasks</a>. The rest requires active collaboration, supervision, and judgment.</p>



<p>Code itself is becoming a commoditized implementation detail. The real craft, the work that determines whether software is good, secure, and correct, is moving upstream to intent, design, and context.</p>



<h2 class="wp-block-heading">Three audiences of agentic builders</h2>



<p>The Agentic SDLC isn&#8217;t producing a single, uniform type of builder. It&#8217;s producing three distinct audiences, each with fundamentally different relationships to code, to tooling, and to the enterprise development pipeline. Understanding this breakdown is essential, because each audience creates a different category of security challenge.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="1680" height="850" src="https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-8.png" alt="Securing the Agentic SDLC Blog 8 Securing the Agentic SDLC" class="wp-image-1210" srcset="https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-8.png 1680w, https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-8-300x152.png 300w, https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-8-1024x518.png 1024w, https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-8-768x389.png 768w, https://clover.security/wp-content/uploads/2026/04/Securing-the-Agentic-SDLC_Blog-8-1536x777.png 1536w" sizes="(max-width: 1680px) 100vw, 1680px" /><figcaption class="wp-element-caption">The new builders of the Agentic SDLC</figcaption></figure>



<h3 class="wp-block-heading">Audience 1: Technical builders</h3>



<p>These are the professional software engineers who have evolved from writing code to orchestrating agents that write it for them. They are the core of the Agentic SDLC.</p>



<p>In Anthropic&#8217;s framing, the engineer&#8217;s role has shifted from &#8220;implementer to orchestrator.&#8221; In 2026, the value of an engineer&#8217;s contribution increasingly lies in system architecture design, agent coordination, quality evaluation, and strategic problem decomposition. They shepherd multiple features through development simultaneously, applying their judgment across a broader scope than individual implementation ever allowed.</p>



<p>These builders work in tools like Claude Code, Cursor, and IDE-integrated agents. They express intent, provide context via MCP servers and Claude Skills, review agent-generated output, and ship through standard CI/CD pipelines. Some prompt agents conversationally; others collaborate with PMs and architects on detailed design docs that guide agent behavior.</p>



<p>A growing subset of this audience is going further, adopting spec-driven development, where structured specifications are committed to version control and serve as the primary input to autonomous code generation pipelines. <a href="https://github.com/github/spec-kit" target="_blank" rel="noreferrer noopener">GitHub&#8217;s Spec Kit</a> has reached 89.2k stars. <a href="https://venturebeat.com/orchestration/agentic-coding-at-enterprise-scale-demands-spec-driven-development" target="_blank" rel="noreferrer noopener">The Kiro IDE team cut feature builds from two weeks to two days</a>. AWS engineering teams completed an 18-month re-architecture with six people in 76 days. Spec-driven development is powerful, but it remains an optional adventure at this point, a maturity level that some organizations pursue, not a path most companies will necessarily follow. Whether an engineer prompts an agent conversationally or feeds it a formal spec, the common thread is the same: they are technical builders who no longer write code manually, and whose primary craft has shifted to intent, design, and architecture.</p>



<p>The security challenge here is about scale and context. These builders are 10x more productive, shipping at volumes that overwhelm traditional review processes. And the agents they orchestrate make design decisions without institutional memory, without awareness of trust boundaries, past security incidents, or adjacent system dependencies. The output is technically excellent but contextually blind.</p>



<h3 class="wp-block-heading">Audience 2: Semi-technical builders</h3>



<p>A second, rapidly growing segment of builders are those who aren&#8217;t professional engineers but are now producing production code: product managers, designers, data analysts, junior developers. They use natural language, &#8220;vibe coding,&#8221; the <a href="https://x.com/karpathy/status/1886192184808149383?s=20" target="_blank" rel="noreferrer noopener">term coined by Andrej Karpathy</a>, to prompt AI agents and generate working software, which then enters the standard SDLC through pull requests.</p>



<p>The pattern looks like this: the builder describes what they want in plain English. Claude or Cursor generates the code. A developer reviews the PR. Tests run, CI/CD deploys, and the output reaches production. It&#8217;s an enterprise-guardrailed version of vibe coding, the output enters the standard pipeline, but the person who initiated it may have limited understanding of the architectural and security implications of what they&#8217;re shipping.</p>



<p>The code itself is often syntactically clean, AI models are sophisticated enough to avoid the tactical issues that scanners flag. But the design decisions embedded in that code are made by an AI agent operating without organizational context, without understanding of the broader system architecture. Palo Alto&#8217;s Unit 42 has <a href="https://unit42.paloaltonetworks.com/securing-vibe-coding-tools/" target="_blank" rel="noreferrer noopener">documented real-world breaches</a> caused by this exact pattern: a sales lead app compromised because the agent skipped authentication and rate limiting, an AI agent deleting an entire production database despite explicit instructions, authentication bypasses from exposed public IDs. Their root cause finding is that AI models &#8220;prioritize function over security&#8221; and suffer from &#8220;critical context blindness.&#8221; <a href="https://escape.tech/blog/methodology-how-we-discovered-vulnerabilities-apps-built-with-vibe-coding/" target="_blank" rel="noreferrer noopener">An independent scan by Escape.tech</a> of 5,600 vibe-coded production applications confirmed the scale of the problem: over 2,000 vulnerabilities, 400+ exposed secrets, and 175 instances of exposed PII, including medical records and authentication credentials. And these are typically design-level flaws, not syntax errors.</p>



<p>Anthropic&#8217;s own research confirms this is becoming mainstream: the barrier separating &#8220;people who code&#8221; from &#8220;people who don&#8217;t&#8221; is becoming permeable. As their report notes, &#8220;coding capabilities democratize beyond engineering,&#8221; with non-traditional developers building in fields like cybersecurity, operations, design, and data science.</p>



<p>The security challenge here is about visibility and literacy. The people generating code may not understand what a trust boundary is. The developers reviewing their PRs may be overwhelmed by volume. And the design decisions being made are invisible to any tool that only looks at code.</p>



<h3 class="wp-block-heading">Audience 3: Citizen developers</h3>



<p>The third audience is often the least visible, and introduces a unique set of risks. Non-technical builders across sales, marketing, legal, and operations are using Claude, Lovable, and other no-code/low-code tools to build internal applications, automations, and workflows that never enter the formal SDLC at all.</p>



<p>Anthropic&#8217;s trends report confirms this is accelerating: &#8220;Non-technical teams across sales, marketing, legal, and operations gain the ability to automate workflows and build tools with little or no engineering intervention.&#8221; Zapier has <a href="https://claude.com/customers/zapier" target="_blank" rel="noreferrer noopener">achieved 89% AI adoption</a> across its entire organization with 800+ AI agents deployed internally. Anthropic&#8217;s own legal team <a href="https://claude.com/blog/how-anthropic-uses-claude-legal" target="_blank" rel="noreferrer noopener">reduced marketing review turnaround from two to three days down to 24 hours</a> by building Claude-powered workflows. Domain experts implement solutions directly, removing the bottleneck of filing a ticket and waiting for engineering.</p>



<p>Citizen-developed applications break the boundary between corporate security and product security. They operate entirely outside the purview of traditional product security teams. There is no PR to review. No CI/CD pipeline to gate. No design doc to analyze. These applications go directly from business need to production usage, with whatever security posture the AI agent happened to bake in by default. They often handle real customer data, connect to real internal systems, and operate as de facto production software, without ever being seen by a security engineer.</p>



<h2 class="wp-block-heading">A security mandate that can&#8217;t be met</h2>



<p>Product security teams were already struggling to keep up with human developers long before any of this started. Backlogs were growing, reviews were slipping, and threat models were going stale faster than teams could refresh them. Now add agentic developers shipping at 10x volume, vibe-coded pull requests from semi-technical builders who don&#8217;t know what a trust boundary is, and citizen-built shadow IT that never enters the pipeline at all. This rapidly increases the threat surface, at a pace no human process was designed to match.</p>



<p>Manual review processes, design reviews, architecture assessments, and threat models all remain high-fidelity activities that catch real flaws. But they are fundamentally human-speed processes facing machine-speed output from three different directions.</p>



<p>This is the core tension of the Agentic SDLC: security teams are under more pressure than ever to secure these applications, while also being expected to enable the greatest productivity boost of our generation. Block the agentic pipeline and you block the business. Let it run unchecked and you accept unquantifiable risk.</p>



<h2 class="wp-block-heading">What security for the Agentic SDLC requires</h2>



<p>We founded Clover because the industry requires a fundamentally new approach to software security, one that works across all builder audiences, at machine speed, with continuous understanding of design, architecture, and intent.</p>



<p>Context is the new foundation. In the traditional SDLC, humans carried context implicitly, why this service exists, what data it handles, what the trust model is. In the Agentic SDLC, that context evaporates. AI agents operate without institutional memory, without awareness of adjacent systems, without understanding of past security decisions. Security that doesn&#8217;t start with context, deep, architectural, continuously-updated context, is security that can&#8217;t function at an agentic scale.</p>



<p>Clover builds a live context engine that fuses product context (what we&#8217;re building and why), technical context (how it&#8217;s built, what talks to what, where sensitive data flows), and security context (what could go wrong, what&#8217;s been reviewed, what assumptions remain unvalidated). It does this by plugging into the tools builders already use: Confluence, Jira, GitHub, Claude, Slack, and continuously analyzing the evolving state of every product and application.</p>



<p>Building an effective context engine is the difference between security agents that spit out AI slop and an effective agentic infrastructure that actually works at scale. With the right context in place, this engine can secure all three builder audiences:</p>



<ol class="wp-block-list">
<li>Technical builders get fast, high-signal feedback they can iterate on, without the noise of traditional scanners.</li>



<li>Semi-technical builders produce higher-quality code with simpler inputs, as architectural context is enforced downstream.</li>



<li>Citizen developers can move quickly while staying within company guardrails, even outside the formal SDLC.</li>
</ol>



<p>The security shift isn’t from scanners to better scanners. It’s from scanning code to understanding context. When code is commoditized, risk moves upstream, into design decisions, architecture, and implicit assumptions agents make without awareness. AI-generated code will often pass scanners while still introducing systemic flaws. The question is no longer simply “is this code vulnerable?” but “did we make the right decisions before the code existed?” Clover operates at that layer, analyzing intent, architecture, and trust boundaries before they become implementation.</p>



<h2 class="wp-block-heading">Facing the security challenge (and opportunity) of the decade</h2>



<p>When your builders adopt something faster than you can govern it, that&#8217;s a signal that your security model&#8217;s status quo is shifting beneath you. GitHub arrived in enterprises through backchannels years before security teams were ready to bless it. ChatGPT showed up on employee laptops months before most CISOs had an AI policy. Every seismic shift in how software gets built has followed the same pattern: the builders move first, the organization catches up later, and the security teams who treated the shift as a threat to contain ended up running behind the ones who treated it as a shift to secure. The Agentic SDLC is the same pattern, at a larger scale, moving faster.</p>



<p>And the pattern is already playing out. Inside the organizations moving fastest, the Agentic SDLC is not next year&#8217;s planning exercise, it&#8217;s today&#8217;s production reality. Engineers are orchestrating agents. Product managers and designers are shipping vibe-coded features. Sales, legal, and operations are building applications that never touch a pull request. The builders are already speaking loudly, in three different voices, and the security model sitting on your desk wasn&#8217;t designed to hear any of them.</p>



<p>Every security leader reading this already has more on their plate than the hours in a day allow. Scanners to triage, vulnerabilities to patch, pen tests to run, compliance clocks ticking. All of it matters. All of it is real. But none of it will define the next decade of product security. This will. The leaders who recognize that first, the ones who stop treating agentic development as a threat to contain and start treating it as the terrain they now operate on, are the ones who will still be leading when the dust settles. The rest will be explaining to their boards why the pipeline got away from them.</p>



<p>The craft of software has moved from code to intent. The craft of security has to follow. Not eventually. Now.</p>



<p></p>



<p><strong>We&#8217;ve been building Clover for exactly this future, and we&#8217;ll have a lot more to share soon. If you&#8217;d like an early look at what we believe security for the agentic era has to be, get in touch.</strong></p>



<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script>
<script>
  hbspt.forms.create({
    portalId: "49267781",
    formId: "bcbc5f33-9e4e-46c0-9612-84d3e783bc96",
    region: "na1"
  });
</script>
<p>The post <a rel="nofollow" href="https://clover.security/blog/securing-the-agentic-sdlc-clover-security/">Securing the Agentic SDLC</a> appeared first on <a rel="nofollow" href="https://clover.security">Clover Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ServiceNow invests in cyber startup Clover Security</title>
		<link>https://clover.security/blog/servicenow-invests-in-cyber-startup-clover-security/</link>
					<comments>https://clover.security/blog/servicenow-invests-in-cyber-startup-clover-security/#respond</comments>
		
		<dc:creator><![CDATA[Alon Kollmann]]></dc:creator>
		<pubDate>Sun, 22 Mar 2026 21:22:27 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://clover.security/?p=1132</guid>

					<description><![CDATA[<p>The partnership will integrate Clover’s AI-driven security tools into ServiceNow’s enterprise software platform. </p>
<p>The post <a rel="nofollow" href="https://clover.security/blog/servicenow-invests-in-cyber-startup-clover-security/">ServiceNow invests in cyber startup Clover Security</a> appeared first on <a rel="nofollow" href="https://clover.security">Clover Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em><strong>Originally published by <a href="https://www.calcalistech.com/ctechnews/article/hywysi6q11g#google_vignette" target="_blank" rel="noreferrer noopener">CTech</a></strong></em></p>



<p>After acquiring three companies in Israel, American software giant ServiceNow is also investing directly in Israeli startups. Calcalist has learned that ServiceNow has invested in Israeli cybersecurity company Clover Security, in a deal estimated to be worth several million dollars.</p>



<p>As part of the investment, ServiceNow is expected to integrate Clover’s technology into its own suite of enterprise solutions and will also become a customer of the company.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="1024" height="681" src="https://clover.security/wp-content/uploads/2026/03/Clover-founders.jpg" alt="Clover founders ServiceNow invests in cyber startup Clover Security" class="wp-image-1133" srcset="https://clover.security/wp-content/uploads/2026/03/Clover-founders.jpg 1024w, https://clover.security/wp-content/uploads/2026/03/Clover-founders-300x200.jpg 300w, https://clover.security/wp-content/uploads/2026/03/Clover-founders-768x511.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Clover founders. (Photo: Netanel Tobias)</figcaption></figure>



<p>Clover was founded in 2023 by Alon Kollmann (CEO) and Or Chen (CPO). The two met in 2022, when Kollmann was pursuing an MBA in France and Chen was completing his tenure at Checkmarx, which had acquired Chen’s previous startup.</p>



<p>Clover integrates AI agents into everyday developer tools such as Confluence, Jira, GitHub, Cursor, and Slack, enabling teams to identify design flaws early and build securely from the outset. Its AI agents replicate the mindset of experienced security professionals, understanding system behavior, predicting where vulnerabilities may emerge, and applying security principles before development begins. As a result, security teams are relieved of repetitive work, and developers receive real-time security guidance inside their existing workflows.<a href="https://www.calcalistech.com/ctechnews/article/hkerfecywx" target="_blank" rel="noopener"></a></p>



<p>In November, Clover raised $36 million in a funding round led by Notable Capital and Team8. Since then, the company has expanded its operations, signed additional customer agreements, and reached a revenue run rate of more than $1 million per quarter. Clover currently employs around 50 people, most of them based in Israel, with the remainder in the United States.</p>



<p>ServiceNow has been steadily expanding its presence in cybersecurity in recent years, positioning the sector as a key growth engine. The company has previously invested in Snyk and recently acquired Armis for approximately $7.75 billion. It also announced acquisitions of Israeli AI and data companies Pyramid Analytics and Traceloop.</p>



<p>The partnership with ServiceNow is expected to significantly expand Clover’s market reach, giving it access to thousands of enterprise customers worldwide through ServiceNow’s platform.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“ServiceNow is one of the most influential enterprise software platforms in the world,” said Kollmann. “The decision to invest in us and partner with us reflects how the market is evolving. As AI-driven development accelerates, security must be embedded directly into the software creation process, not added later. For us, this is another step toward making this approach the standard in global organizations.”</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://clover.security/blog/servicenow-invests-in-cyber-startup-clover-security/">ServiceNow invests in cyber startup Clover Security</a> appeared first on <a rel="nofollow" href="https://clover.security">Clover Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://clover.security/blog/servicenow-invests-in-cyber-startup-clover-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SVCI backs Clover Security to empower companies to secure their products by-design, fueled by AI</title>
		<link>https://clover.security/blog/svci-backs-clover-security-to-empower-companies-to-secure-their-products-by-design-fueled-by-ai/</link>
					<comments>https://clover.security/blog/svci-backs-clover-security-to-empower-companies-to-secure-their-products-by-design-fueled-by-ai/#respond</comments>
		
		<dc:creator><![CDATA[Alon Kollmann]]></dc:creator>
		<pubDate>Tue, 25 Nov 2025 10:00:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloversecdev.wpenginepowered.com/?p=235</guid>

					<description><![CDATA[<p>Security leaders across the industry are recognizing that the future of product security begins with design, not after code is written. SVCI’s support reflects a shared belief that teams need intelligence in the earliest moments of creation so they can build securely from the start.</p>
<p>The post <a rel="nofollow" href="https://clover.security/blog/svci-backs-clover-security-to-empower-companies-to-secure-their-products-by-design-fueled-by-ai/">SVCI backs Clover Security to empower companies to secure their products by-design, fueled by AI</a> appeared first on <a rel="nofollow" href="https://clover.security">Clover Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>SVCI backs design-led security</h2>
<p>Today we are proud to share that Silicon Valley CISO Investments (SVCI) has joined Clover Security as a strategic investor. What makes SVCI distinct is not only their track record of successful investments, but their perspective as practicing security leaders. SVCI is a community that brings together dozens of CISOs who protect some of the most complex and consequential technology environments in the world. SVCI members lead security programs for some of the most technology-enabled and forward leaning companies that are rapidly embracing AI-native software development. As early adopters of this shift, they have concluded that … design-led security must be accelerated, iterated and rapidly integrated into the development lifecycle to maintain pace with the way software is being built today. The winners through this era will be those companies that adopt this trend and evolve alongside as the bar continues to be raised on what it takes to earn customer trust.</p>
<h2>Why Clover</h2>
<p>Across the ecosystem, a clear shift is underway. Security teams are increasingly shifting their focus to collaborating with engineers early in the development lifecycle. The most critical design decisions often take place even before a single line of code is written; security needs visibility and influence into those decisions, to ensure product changes are built securely by nature.</p>
<p>Clover stood out to SVCI not only because of its unique, fresh perspective on the evolution of product security, but also because of its rapid customer adoption and growth, signaling a clear market shift. Customers with advanced engineering stacks or resource constraints are rapidly adopting design-led product security not as an experiment but as a strategic part of how they build software. Together with Clover’s consistent execution, rapid expansion within organizations, and customer feedback, this solidified SVCI’s conviction that Clover is positioned to lead a new category and define how modern software will be secured.</p>
<h2>What’s next</h2>
<p>With SVCI, Clover gains both strategic insight and direct access to the leaders shaping how security teams adapt to AI-native development. Their experience helps us refine the technology where it matters most, and their network accelerates the adoption of design-led product security across the industry. This partnership strengthens our ability to define new expectations and build the standards that will guide how software is securely designed in the years ahead.</p>
<p>The post <a rel="nofollow" href="https://clover.security/blog/svci-backs-clover-security-to-empower-companies-to-secure-their-products-by-design-fueled-by-ai/">SVCI backs Clover Security to empower companies to secure their products by-design, fueled by AI</a> appeared first on <a rel="nofollow" href="https://clover.security">Clover Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://clover.security/blog/svci-backs-clover-security-to-empower-companies-to-secure-their-products-by-design-fueled-by-ai/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Introducing Clover Security: Design-led product security for the AI era</title>
		<link>https://clover.security/blog/introducing-clover-security-design-led-product-security-for-the-ai-era/</link>
					<comments>https://clover.security/blog/introducing-clover-security-design-led-product-security-for-the-ai-era/#respond</comments>
		
		<dc:creator><![CDATA[Alon Kollmann]]></dc:creator>
		<pubDate>Tue, 25 Nov 2025 10:00:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloversecdev.wpenginepowered.com/?p=317</guid>

					<description><![CDATA[<p>Today, we’re excited to launch Clover Security with $36 million to redefine product security for the AI era.</p>
<p>The post <a rel="nofollow" href="https://clover.security/blog/introducing-clover-security-design-led-product-security-for-the-ai-era/">Introducing Clover Security: Design-led product security for the AI era</a> appeared first on <a rel="nofollow" href="https://clover.security">Clover Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Today, we&#8217;re excited to&nbsp;<a href="https://www.axios.com/2025/11/25/clover-security-funding-wiz-crowdstrike-notable-capital" target="_blank" rel="noreferrer noopener">launch Clover Security with $36 million to redefine product security for the AI era</a>.</p>



<p>Let’s be honest: it’s become completely impossible to keep up with the progress of AI and how it transforms software development. Every time we think we have a handle on what’s going on, OpenAI or Anthropic releases another model, capability, or way of building apps.</p>



<p>What started with basic code-completion capabilities has now evolved into autonomous agents that act on behalf of developers, generating code and features at an unimaginable speed. But architecture itself is also getting more complex. New AI patterns like RAG, agents, and MCPs are being pushed into existing products before security guardrails and policies are even set. And if that&#8217;s not enough, HR and Marketing teams are now spinning up entire products in hours. Everyone has become a builder, and that reality is here to stay.</p>



<div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex">
<div class="wp-block-button"><a class="wp-block-button__link wp-element-button" rel="#book-a-demo">Book a demo</a></div>
</div>



<h2 class="wp-block-heading" id="heading-1">What this means for security</h2>



<p>This new era brings extraordinary innovation but also unprecedented risk. Engineering capacity is multiplying through AI while security capacity has remained largely fixed, and the gap is only widening. When AI agents can generate entire features in seconds, the old reactive security model simply can’t keep pace.</p>



<p>For the past decade, we tried to solve software security by looking for better ways to do reactive scanning. Scanning more, scanning earlier, scanning smarter&#8230; “Focus on what matters most”, they said. In theory, it sounded like progress. In practice, we’ve been incrementally optimizing a flawed approach. SAST, SCA, DAST, secret scanners, ASPMs, CSPMs, runtime scanners, reachability, prioritization, and remediation, AI-powered AppSec, agentic AppSec. Different names, different roles &#8211; all different flavors of the same reactive pattern. All focused on detecting issues after implementation had been completed and developers had moved on to the next task. We’ve been adding smarter fire alarms to a straw house that keeps catching fire instead of rebuilding with fire-resistant materials.</p>



<p>With AI, it’s even clearer that reactive security is flawed at its core. AI models are continuously improving to the point where they will eventually stop introducing known vulnerabilities altogether. At the same time, AI gradually distances builders from code syntax, intricate implementation details, and focuses their attention on high-level design, specification, and outcome.</p>



<p>In this new world, reactive scanners are simply not enough. Security has to be design-led. It must understand intent, architecture, and system behavior before code exists. Teams don’t need another scanner or a faster workflow. They need a way to eliminate entire classes of issues by addressing them where they start, inside the design process. That’s how security moves at the speed of development, embedded where products begin instead of where they break.</p>



<h2 class="wp-block-heading" id="heading-2">A new design-led mindset</h2>



<p>Design-led product security is about&nbsp;<strong>making security a natural part of the building process</strong>, guiding and collaborating with builders long before implementation begins. Every architectural decision is a potential security decision. Every integration, every data flow, every dependency carries consequences that no tool can “patch out” later. These decisions are being made by developers, product managers, architects, and AI agents &#8211; while security teams are not in the room, more often than they are.</p>



<p>Clover was built to live in that creative moment: the earliest conversations, the messy drafts, the evolving diagrams. It was built to bring the security guidance that helps teams reason about security, privacy, and compliance &#8211; and influence decision making before those ideas translate into code.</p>



<p>Similar to onboarding a new security team member, Clover’s AI agents start with learning the organization’s context, digging into existing documents and code bases, observing how teams build, and continuously learning from feedback. Finally, they can naturally extend the security team and help them scale manual activities like design reviews, architecture reviews, threat modeling, and more &#8211; in ways that were simply not possible before.</p>



<h2 class="wp-block-heading" id="heading-3">Scaling product security with context</h2>



<p>We believe security should scale at the speed of innovation. That means:</p>



<p><strong>Starting with context</strong>. Understanding architecture, intent, and system behavior before anything is built, so security becomes part of the design conversation, not the post-mortem.</p>



<p><strong>Meeting builders where they are</strong>. Inside the tools where ideas are captured, designs evolve, and code takes shape, including Confluence, Jira, GitHub, Cursor, and Slack.</p>



<p><strong>Designed for scale</strong>. Scaling secure design means operating in complex enterprise environments, with varying technologies, processes, and cultures.</p>



<p>These are the design principles that guide every feature and use case we build at Clover. They didn’t come out of creative brainstorming sessions, but from hard lessons our team learned over the past decade building application and cloud security solutions at places like Microsoft, Checkmarx, and Dazz (acquired by Wiz).</p>



<p>We learned through hard lessons that product security cannot be reactive. It must be proactive.</p>



<p>It’s become clear to us: good product security is when builders don’t feel you slow them down. Great product security is when builders want to pull you into the room, not because they have to, but&nbsp;<strong>because you make their product better</strong>.</p>



<h2 class="wp-block-heading" id="heading-4">Looking ahead</h2>



<p>We’re proud to see Clover powering teams that are building some of the most advanced products in the world &#8211; across financial services, enterprise software, and consumer applications. Our mission is simple but transformative:&nbsp;<strong>make software products secure by nature.</strong></p>



<p>As AI reshapes how software is built, we’re redefining how it is secured. Because in the AI era, the most powerful way to make products secure isn’t to react faster, it’s to design smarter.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://clover.security/blog/introducing-clover-security-design-led-product-security-for-the-ai-era/">Introducing Clover Security: Design-led product security for the AI era</a> appeared first on <a rel="nofollow" href="https://clover.security">Clover Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://clover.security/blog/introducing-clover-security-design-led-product-security-for-the-ai-era/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Iain Mulholland, security leader at Google Cloud, on product security in the AI-native era</title>
		<link>https://clover.security/blog/iain-mulholland-security-leader-at-google-cloud-on-product-security-in-the-ai-native-era/</link>
					<comments>https://clover.security/blog/iain-mulholland-security-leader-at-google-cloud-on-product-security-in-the-ai-native-era/#respond</comments>
		
		<dc:creator><![CDATA[Alon Kollmann]]></dc:creator>
		<pubDate>Mon, 17 Nov 2025 10:00:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloversecdev.wpenginepowered.com/?p=252</guid>

					<description><![CDATA[<p>AI is reshaping how products are built, and Google Cloud’s Iain Mulholland breaks down what that shift means for security teams. In this conversation, he explores how AI makes secure by design real, scalable, and deeply integrated into the development workflow.</p>
<p>The post <a rel="nofollow" href="https://clover.security/blog/iain-mulholland-security-leader-at-google-cloud-on-product-security-in-the-ai-native-era/">Iain Mulholland, security leader at Google Cloud, on product security in the AI-native era</a> appeared first on <a rel="nofollow" href="https://clover.security">Clover Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading" id="heading-1">The AI impact on product security</h2>



<p>I&#8217;m excited about what AI can do with regard to product security. Google has been around this space for a long time and yet, we still have the same issue of scale: There are simply never enough security engineers. You could give me a thousand more security engineers, and I still wouldn&#8217;t be able to cover everything that I’d want to cover. But AI changes all that, particularly in the product security space, because it can be present all the time and do it at scale.</p>



<p>Traditional tools are very good at identifying issues, but ultimately, that breaks down when the suggestion just ends up sitting in a queue for some developer to go and manually fix. The ability for AI to not only identify the issue, but then actually go and fix the issue, is a gamechanger and very scalable.</p>



<p>Another point is that AI can be there all day, every day, and more critically, built directly into automation workflows. Many processes today are asynchronous: They rely on the security engineer being available and to assist in a consultative type role. That role really ends up being a Monday-to-Friday type of job. If you have an AI that’s integrated into your CI/CD pipelines, it&#8217;s present all the time, and a built-in part of the continuous flow.</p>



<div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex">
<div class="wp-block-button"><a class="wp-block-button__link wp-element-button" href="#interviewYT">Watch full interview</a></div>
</div>



<h2 class="wp-block-heading" id="heading-2">Product security vs application security</h2>



<p>In traditional application security, legacy tools such as SAST or SCA, scan the products and then they create a backlog of issues that have to be remediated, all of which happens outside of the development process. The teams developing products are going through the build process, doing beta releases, and working on getting that product to market. Product security thinks about it much more holistically.</p>



<p>Product security looks at the purpose of the product and sees it as a business problem to solve. It’s about being involved in the holistic process of building a product so it&#8217;s much more integrated and focused on realtime.</p>



<p>There is a transition that has to take place between the AppSec model and the product security approach. How do we move security engineering teams from being blockers to actually business enablers? How do you actually understand where your product teams are? What are their business objectives? How do you fit into all that and ensure that you&#8217;re adding momentum to the business, not taking it away? How do you move from being the team that says “No” to the team that is figuring out ways to say “Yes”?</p>



<figure class="wp-block-image is-resized"><img loading="lazy" decoding="async" width="1024" height="386" src="https://clover.security/wp-content/uploads/2025/11/blog-inner-google-cloud-2-1024x386.jpg" alt="Cover Image 2" class="wp-image-352" style="width:840px;height:auto" srcset="https://clover.security/wp-content/uploads/2025/11/blog-inner-google-cloud-2-1024x386.jpg 1024w, https://clover.security/wp-content/uploads/2025/11/blog-inner-google-cloud-2-300x113.jpg 300w, https://clover.security/wp-content/uploads/2025/11/blog-inner-google-cloud-2-768x290.jpg 768w, https://clover.security/wp-content/uploads/2025/11/blog-inner-google-cloud-2-1536x580.jpg 1536w, https://clover.security/wp-content/uploads/2025/11/blog-inner-google-cloud-2.jpg 1680w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>AI is already being used significantly for code development and product development, and that&#8217;s pretty exciting. We’re nearing a world where we are going from having “software engineers” to having “software designers.” It’s a world where a developer turns to LLMs to take a prompt to build an application that solves a certain problem, describing how the user interface should look, providing the data sources. That’s where design-led product security is important. It takes those inputs from the developer and applies the proper security policies and security guardrails automatically. It finds the secure ways to access that data source the developer wants to use, whether it’s by using a specific connection method, or a type of encryption, or any other rule that the product security team has codified.</p>



<p>How do we describe in language that AI can use and apply our security guardrails, our security principles, our known vulnerabilities? That last part about known vulnerabilities is really critical, because AI allows us to also understand where our developers are making mistakes, where the failure patterns are, and then actually catch those patterns and describe them as patterns, and ultimately correct them.</p>



<h2 class="wp-block-heading" id="heading-3">The well-lit paths of building secure by design</h2>



<p>At Google Cloud it&#8217;s very important for us to include security at the design level. We’ve recently signed on as part of the US government’s <a title="Secure by Design Pledge" href="https://www.cisa.gov/securebydesign/pledge" target="_blank" rel="noopener">Secure by Design Pledge</a>, but frankly, we&#8217;ve been doing security by design for a very long time. It&#8217;s an expectation, a very reasonable expectation, of our customers. The question is simple: How do we create well lit paths for our developers to do the right thing?</p>



<p>We look at it through a number of ways. One of those ways is by directing our partners and developers towards the well-lit paths: Use this library, use this framework, use this vendor, and you&#8217;re going to get all of the security that you need for free. You don&#8217;t actually need to devote more time to thinking about it. It takes out the friction and makes things much easier.</p>



<p>The second thing is making sure that devotion to security by design is expressed to customers. Sometimes, the customer needs to make a choice. Large enterprises have their own needs, and it may not be clear to them what they need to be able to do in order to become secure by design. That’s why one of the things that we will do is make deliberate choices about default settings. Should we apply the secure by design default which is more secure, and then allow the customer to disable that security setting if their use case requires them to be less secure, say as for integrating with a legacy application. That’s also why we work very closely with our development teams to have the product shipped in a more secure state, while giving the customer the awareness that, if necessary, they can back that off.</p>



<p>These are examples of very conscious choices and well-lit paths. It’s really more a question of how far we can go with this approach.</p>



<h2 class="wp-block-heading" id="heading-4">How Clover is changing product security</h2>



<p>As a product security leader, my challenge has always been how to scale and how do I get deeper into the product space, even to the point where our customers are. A major obstacle is that there&#8217;s just never enough security engineers. Taking an AI driven approach is an exciting opportunity in this regard, because AI allows scale and increases productivity. And Clover helps do that.</p>



<figure id="interviewYT"><iframe loading="lazy" title="Iain Mulholland, OCISO leader at Google Cloud, on Product Security in the AI-native era" src="https://www.youtube.com/embed/zeS0nX5dJqo" width="996" height="560" frameborder="0" allowfullscreen="allowfullscreen"></iframe>
<figcaption><a title="Watch the full conversation between Iain Mulholland and Alon Kollmann here." href="https://vimeo.com/crcmedia/review/1126255942/cc9c26e632" target="_blank" rel="noopener">Watch the full conversation between Iain Mulholland and Alon Kollmann here.</a></figcaption>
</figure>
<p>The post <a rel="nofollow" href="https://clover.security/blog/iain-mulholland-security-leader-at-google-cloud-on-product-security-in-the-ai-native-era/">Iain Mulholland, security leader at Google Cloud, on product security in the AI-native era</a> appeared first on <a rel="nofollow" href="https://clover.security">Clover Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://clover.security/blog/iain-mulholland-security-leader-at-google-cloud-on-product-security-in-the-ai-native-era/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://www.youtube.com/embed/zeS0nX5dJqo" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/zeS0nX5dJqo" />
			<media:title type="plain">Iain Mulholland, security leader at Google Cloud, on Product Security in the AI-native era</media:title>
			<media:description type="html"><![CDATA[AI is reshaping how products are built, and Google Cloud’s Iain Mulholland breaks down what that shift means for security teams. In this conversation, he exp...]]></media:description>
			<media:thumbnail url="https://clover.security/wp-content/uploads/2026/01/iain-mulholland-security-leader-.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>Secure by design: a mantra in search of meaning</title>
		<link>https://clover.security/blog/secure-by-design-a-mantra-in-search-of-meaning/</link>
					<comments>https://clover.security/blog/secure-by-design-a-mantra-in-search-of-meaning/#respond</comments>
		
		<dc:creator><![CDATA[Alon Kollmann]]></dc:creator>
		<pubDate>Mon, 17 Nov 2025 09:30:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloversecdev.wpenginepowered.com/?p=259</guid>

					<description><![CDATA[<p>A closer look at why secure by design often falls short in practice, how the concept drifted from real design work, and how a design led approach can help teams make security actionable with clearer decisions, stronger defaults, and better outcomes.</p>
<p>The post <a rel="nofollow" href="https://clover.security/blog/secure-by-design-a-mantra-in-search-of-meaning/">Secure by design: a mantra in search of meaning</a> appeared first on <a rel="nofollow" href="https://clover.security">Clover Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Secure by design has never been a precise idea. The roots of the concept trace back to the 1970s, but it has recently surged back into prominence with CISA&#8217;s secure by design <a href="https://www.cisa.gov/resources-tools/resources/secure-by-design" target="_blank" rel="noreferrer noopener">guidance</a> and <a href="https://www.cisa.gov/securebydesign/pledge" target="_blank" rel="noreferrer noopener">pledge</a>. Security teams, vendors, and regulators now repeat the phrase like a mantra, yet when you press for a definition you&#8217;ll get a dozen different answers. Depending on who&#8217;s speaking, it might mean threat modeling workshops, memory-safe languages, disclosure programs, bug bounties, SBOMs, SAST gates, or simply &#8220;shift left.&#8221; All worthwhile practices, but lumped together under one broad banner, they have turned a specific idea into a catch-all slogan.</p>



<p>The concept still matters: security should be built in, not bolted on. Yet many of the practices labeled as secure by design are quite literally bolt-ons that come into play later in the SDLC, rather than true design commitments made upfront. To attain secure by design we need to lead with design not just work back from CVEs and vulnerabilities to define tactics.</p>



<p>In this article, we’ll give an overview into secure by design as it exists today, its challenges and how we as an industry can reframe the principle to create a roadmap to successful adoption and implementation.</p>



<h2 class="wp-block-heading" id="heading-1">Where secure by design drifts from design</h2>



<p>CISA&#8217;s position in <a href="https://www.cisa.gov/sites/default/files/2023-10/SecureByDesign_1025_508c.pdf" target="_blank" rel="noreferrer noopener">Shifting the balance of cybersecurity risk: Principles and approaches for secure by design software</a> is that vendors should take responsibility for customer security outcomes and ship products that are secure to use out of the box. Secure by default is the companion idea: strong protections should be enabled without extra cost or complex configuration. The message is blunt: the software industry does not need more security products; it needs more secure products.</p>



<p>The secure by design initiative sets the right tone and direction for accountability, transparency, and leadership, but most of its principles and tactics sit outside the actual design phase of software development. Executive sponsorship, metrics, SBOM sharing, and public reporting all shape how an organization behaves, but they do not tell software builders what to design. They are organizational and operational guardrails, not design and planning practices.</p>



<p>The real design layer is tangible. It includes design and architecture reviews, secure patterns and paved-road, threat modeling, security frameworks and requirements, all addressed before a line of code is written. This is where security and design actually intersect.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="524" src="https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-2-1024x524.jpg" alt="We're best practices rich but implementation poor from the article Secure-by-Design Delusions published on Resilient Cyber" class="wp-image-342" srcset="https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-2-1024x524.jpg 1024w, https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-2-300x154.jpg 300w, https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-2-768x393.jpg 768w, https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-2-1536x786.jpg 1536w, https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-2.jpg 1680w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Secure-by-Design Delusions / <a href="https://www.resilientcyber.io/p/secure-by-design-delusions" target="_blank" rel="noreferrer noopener">Resilient Cyber</a></figcaption></figure>



<h2 class="wp-block-heading" id="heading-2">Bringing order to the secure by design chaos</h2>



<p>If secure by design is to be actionable, it needs to be specific and concrete. The term has grown so broad that it can cover leadership buy in, threat modeling, and everything in between. There is a suite of related terms at our disposal to tighten up secure by design. Namely, secure by design, secure by default, design security, and secure design. Unfortunately they are often mixed up or misapplied, and at this point barely anyone understands their differences.</p>



<p>Here’s a quick breakdown of the differences between them all:</p>



<ul class="wp-block-list">
<li><strong>Secure by design</strong> is the philosophy. It’s the idea of systematically integrating security into every aspect of software development: architecture, requirements, development, deployment, and maintenance. It is the broadest and most comprehensive term here.</li>



<li><strong>Secure by default</strong> is a principle that says the product should ship with safe defaults, making the secure choice the easiest and the insecure choice the intentionally explicit one.</li>



<li><strong>Design security</strong> is the general practice of considering security during the design phase. It is broad and not tied to a methodology or philosophy.</li>



<li><strong>Secure design</strong> is the outcome designs that already incorporate specific security controls to address risks that were identified.</li>
</ul>



<p>As an industry we have spent years focused on the philosophy, the ideal of what secure by design should be. But philosophy does not make software safer. Without practices, measurable outcomes, and principles that guide design and security decisions, the concept stays abstract and aspirational. Making secure by design real means moving from intention to implementation, from stating what we believe to building what we can prove.</p>



<h2 class="wp-block-heading" id="heading-3">Design security is no small feat</h2>



<p>Embedding security at the design stage sounds elegant but proves difficult in practice. True design security requires time, information discovery, domain specific skill, collaboration, and a culture where engineering, product, and security teams are aligned on priorities.</p>



<p>Developers describe <a href="https://www.reddit.com/r/cybersecurity/comments/1mikdbo/why_do_so_many_organizations_still_struggle_to/" target="_blank" rel="noreferrer noopener">impossible tradeoffs between release velocity and secure architecture</a>, management using “shift left” as a cost-saving slogan, and offshore teams working under time and skill constraints that make structured design reviews unrealistic. Others point to a skills gap: few developers are trained to spot subtle logic flaws or unsafe assumptions at design time, and those few product security experts who can are not always brought in early enough or overruled in light of delivery deadlines.</p>



<p>According to <a href="https://go.crowdstrike.com/rs/281-OBQ-266/images/report-2024-state-of-app-security-report.pdf?version=0" target="_blank" rel="noreferrer noopener">CrowdStrike’s 2024 State of Application Security Report</a>, <strong>54 percent</strong> of organizations admit that <strong>fewer than half</strong> of their code changes undergo any form of security review before release. <strong>Seventy percent</strong> say it takes <strong>12 hours or longer</strong> to resolve critical vulnerabilities once discovered. That delay reflects how reactive most programs remain. Security still enters the process too late, and even when design reviews happen, they often give way to speed-to-market pressure and fragmented ownership.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="524" src="https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-3-1024x524.jpg" alt="Graph of % of major code changes that undergo security reviews" class="wp-image-347" srcset="https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-3-1024x524.jpg 1024w, https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-3-300x154.jpg 300w, https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-3-768x393.jpg 768w, https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-3-1536x786.jpg 1536w, https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-3.jpg 1680w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><a href="https://go.crowdstrike.com/rs/281-OBQ-266/images/report-2024-state-of-app-security-report.pdf?version=0" target="_blank" rel="noreferrer noopener">CrowdStrike’s 2024 State of Application Security Report</a></figcaption></figure>



<p>Design security demands more than intention. It requires time to explore misuse cases, authority to challenge feature requirements, and a baseline of engineering maturity that allows teams to integrate security decisions without grinding development to a halt. The problem is not that teams disagree with the concept of secure by design, but that few have the margin, structure, or skills, at scale required to make it real.</p>



<h2 class="wp-block-heading" id="heading-4">The secure by design challenge just became exponential, but there’s a silver lining</h2>



<p>Unless you’ve been living under a rock, it should be no shock that the state of vulnerabilities is only getting worse. Disclosures keep rising year over year, and that is only what we’re aware of at the moment. Organizations already struggle to triage, prioritize, and patch at the pace issues appear, <a href="https://www.resilientcyber.io/p/secure-by-design-delusions" target="_blank" rel="noreferrer noopener">leaving a growing backlog.</a></p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="524" src="https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-4-1024x524.jpg" alt="Graph of cumulative yearly CVE publication" class="wp-image-349" srcset="https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-4-1024x524.jpg 1024w, https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-4-300x154.jpg 300w, https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-4-768x393.jpg 768w, https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-4-1536x786.jpg 1536w, https://clover.security/wp-content/uploads/2025/11/blog-inner-secure-by-design-hot-air-balloon-4.jpg 1680w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">2024 CVE Data Review / <a href="https://jerrygamblin.com/2025/01/05/2024-cve-data-review/" target="_blank" rel="noreferrer noopener">Curiosity in Practice</a></figcaption></figure>



<p>This was a growing problem back when we were just talking in terms of good old fashioned human developers and bad actors. Now AI-native development is accelerating velocity across the board, so the problem is compounding. The existing backlog remains, the pressure to patch and prioritize persists, and we are generating more code faster than ever. Not to mention the fact that bad actors are increasingly leveraging LLMs to both discover new attack vectors but also as a new attack vector in its own right.</p>



<p>There is a silver lining. The same AI that is jet propelling development can be applied to the bottlenecks above: it can close skills gaps with just-in-time design reviews; auto draft and sanity check threat models and architecture reviews; flag unsafe patterns and dependency risks before code merges; generate paved roads and secure default configs; triage the flood of potential risks and threats so humans focus on the highest impact work; and automate design security workflows for both human in the loop security reviews and direct to developer with copilots that provide expert security guidance and safe code suggestions. Used this way, AI amplifies scarce expertise, turns design context into consistent security artifacts, and quantifies previously qualitative design risk across products.</p>



<h2 class="wp-block-heading" id="heading-5">What’s next for secure by design?</h2>



<p>This article sets the foundation for how we think and talk about secure by design. We unpacked the confusion around the term, examined CISA’s framing, and argued that most of what is called secure by design today happens after design is finished.</p>



<p>In the next posts of this series, we’ll dive deeper into the secure by design progression we laid out earlier and explore each layer in depth to provide an adoption and actualization roadmap, starting with design security.</p>
<p>The post <a rel="nofollow" href="https://clover.security/blog/secure-by-design-a-mantra-in-search-of-meaning/">Secure by design: a mantra in search of meaning</a> appeared first on <a rel="nofollow" href="https://clover.security">Clover Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://clover.security/blog/secure-by-design-a-mantra-in-search-of-meaning/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
