According to NetSPI, the Gartner® Hype Cycle™ for Application Security, 2025 provides innovation insights to help organizations with emerging challenges like AI, the evolution of DevSecOps and the growing need for application security tool consolidation.
Gartner reiterates the importance of securing GenAI-enabled applications through AI security testing to help cybersecurity leaders identify exposures in AI-enabled applications.
Through 2029, over 50% of successful cybersecurity attacks against AI agents will exploit access control issues, using direct or indirect prompt injection as an attack vector.
Penetration Testing as a Service (PTaaS) enables organizations to elevate their security posture with continuous assessments that integrate validation earlier in the software development life cycle as compared with traditional pentesting efforts and gives access to real-time findings delivered through a platform, which accelerates remediation and improves collaboration efforts.
Rationalize your tools: Streamline and integrate to reduce complexity.
Leverage GenAI: Use AI to boost DevSecOps and speed up vulnerability fixes.
Adopt innovations wisely: Choose new tech that fits your organization’s maturity and goals.
Disclaimer: Gartner®, Hype Cycle™ for Application Security, 2025, Dionisio Zumerle, published July 22, 2025
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and HYPE CYCLE is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from NetSPI.