κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / Why Training Won’t Solve the Citizen Developer Security Problem
άμυνα
.

Why Training Won’t Solve the Citizen Developer Security Problem

18/08/2025

No-code development is rewriting, no pun intended, how business applications are created. With visual drag-and-drop interfaces, pre-built templates, and reusable components, citizen developers from every corner of the enterprise are now able to build applications without coding experience and deploy them in days or even hours, rather than weeks or months.
From HR professionals automating employee meal card requests to sales teams spinning up pipeline and deal dashboards, the democratization of development is real and irreversible.
But while no-code development platforms are fast-forwarding shadow engineering projects, is security keeping up?
Citizen Developer Training Barriers
In most organizations, security training is a core component of cybersecurity frameworks and often a compliance requirement. Helping employees recognize and respond to cyber threats significantly reduces human error, the leading cause of security breaches.
That said, traditional security training for technically inclined IT staff and developer teams is already a formidable challenge. Rolling out training for citizen developers—employees with little to no formal IT or security background— is exponentially harder for several reasons:

  • Diverse Backgrounds: Citizen developers are business users first. They typically have little or no understanding of compliance or secure coding. Many are unaware of the risks inherent in web-based application development or the security ramifications of integrating third-party connectors and data sources.
  • Global Footprint: Multinational organizations must deliver training in multiple languages and cultural contexts, adapting content to resonate with local norms and regulatory requirements.
  • Platform Proliferation: With multiple no-code platforms — each with unique features, vulnerabilities, and update cycles — keeping training current is a logistical nightmare.
  • Scale: Enterprises may have thousands of citizen developers dispersed across business units, making centralized oversight and training deployment extremely difficult.
  • Turnaround: New applications can be built and deployed in days or even hours, leaving little time for traditional training cycles to catch up—creating risk gaps before mitigation steps can be implemented.

Why Security Training Falls Short
It’s a well-known fact: security training has always struggled to deliver lasting behavioral change. For two decades, employees have been told, “Don’t click suspicious links in emails.” Yet, click rates on phishing emails remain stubbornly high. Why? Human error is persistent, so training alone is not enough.
In response, businesses are layering technology — advanced email gateways, sandboxing, Endpoint Detection and Response (EDR), and real-time URL scanning — around users to compensate for their inevitable lapses in judgment.

Consider security training for professional developers. According to a report from Linux Foundation’s Open Source Security Foundation (OpenSSF), 28% of developers are unfamiliar with secure coding practices and 53% have never taken a course on the topic.
In addition, there is widespread dissatisfaction with theoretical, impractical training. The industry responded with various security testing methods, including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Secure Software Development Lifecycle (SSDLC), Peer Code Reviews, and more.
The lesson is clear: Training is necessary but insufficient and must be supplemented with technology controls.
Citizen Development: New Frontier, Same Old Problem
The same dynamic is now playing out with no-code development. Enterprises face risks like injection flaws, unauthorized data access, and security bypasses — all of which are introduced by citizen developers.
Unfortunately, traditional AppSec tools fall short for no-code apps, which aren’t built line by line and rely on proprietary logic inaccessible to standard code scans. Even with access, interpreting their risks demands specialized cybersecurity expertise, rendering traditional code-scanning tools ineffective. Moreover, no-code platforms often block runtime integration, making DAST tools incompatible with these environments.
Here are three specific roadblocks that often prevent organizations from mitigating risks in no-code app development:

  • Lack of Governance and Visibility: Security teams often lack tools to monitor or enforce policies across no-code platforms. Without visibility, even the most experienced AppSec professionals are flying blind and unable to assess what sensitive data may be exposed or at risk.
  • Remediation and Learning: When issues are discovered, remediation often happens in isolation, with little feedback to citizen developers. The opportunity for learning and improvement is lost.
  • Platform-Specific Risks: Each no-code platform introduces unique vulnerabilities. Training must be tailored, but the pace of platform evolution makes this nearly impossible at scale.

Why No-Code Needs Dedicated AppSec
Training will always be a drop in the bucket when it comes to no-code security. Citizen development is nothing short of a paradigm shift that demands evolved application security. We need effective security controls purpose-built for no-code environments.
Here are four ways that dedicated no-code security measures can mitigate risks:

  • Automated Policy Enforcement: No-code AppSec solutions can monitor application development in real-time, flagging vulnerabilities, risky configurations, data exposures, and integration flaws before they go live.
  • In-Context Education and Remediation: Instead of outdated once-a-year compliance training, these tools provide just-in-time guidance, alerting citizen developers to issues as they build—and explaining how to fix them.
  • Centralized Visibility: Security teams gain a unified view of all no-code activity in the enterprise, enabling them to prioritize risks, enforce standards, and respond quickly to incidents.
  • Continuous Adaptation: As platforms and threats evolve, dedicated solutions update protections automatically, closing the gap left by slow-moving training programs.

While training remains essential, it’s not sufficient on its own. The scale, speed, and diversity of no-code adoption demand a new, layered approach to risk management — one that takes technical controls beyond user education and embeds security directly into the development experience. By building security into the fabric of innovation, we can empower citizen developers to move fast — without breaking things or exposing critical business data.
Source: technewsworld.com

Filed Under: INDUSTRY NEWS Tagged With: Source-5

This survival horror game with 96% positive reviews is at its lowest price ever on Steam, if you're quick

The Steam Autumn Sale is coming to an end, so now is the time to pick up those deals you've been thinking about. If you're still looking for a good discount to pull the trigger on, how about grabbing a horror game to get into the October spirit? Source: xda-developers.com … [Read More...]

Kuttram Purindhavan: The Guilty One OTT Release: Pasupathy’s Gripping Thriller Coming Soon

Kuttram Purindhavan: The Guilty One is an intense Tamil suspense thriller which looks at the moralities, secrets and consequences of hidden sins. Driven by Pasupathy's commanding central performance, the series looks at how one man's actions start to infect him with guilt, turmoil and moral ambiguity. A reluctant protagonist driven to desperation, the story holds out cerebral tension and internal … [Read More...]

Someone built an ESP32 handheld NES emulator as their "first embedded project," and I wish all my first projects went this well, too

My first projects don't always turn out as planned. But that's okay, you know? Because the first time is always a learning experience. It's all about getting accustomed to the situation, figuring out how to accomplish tasks, and laying a foundation for future endeavors. And I remind myself that those early projects are essential, as a way to "fail forward" and keep improving. And I love them for … [Read More...]

Tornado OTT Release Date: When and Where to Watch This British Period Drama Online?

Written and directed by John Maclean, Tornado is a British period drama movie that stars Koki in the lead role. The film revolves around Tornado, a samurai fighter, who embarks on a quest to take revenge for his father's murder and steal the gold of the loot. However, things get intense when she finally crosses paths with a crime gang led by the Sugarman and his son, Little Sugar. The movie has … [Read More...]

New WireTap Attack Break Server SGX To Exfiltrate Sensitive Data

A newly disclosed vulnerability, named the WireTap attack, allows attackers with physical access to break the security of Intel’s Software Guard eXtensions (SGX) on modern server processors and steal sensitive information. A research paper released in October 2025 details how this method can extract cryptographic keys from supposedly secure SGX enclaves using a low-cost setup, challenging the … [Read More...]

Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code

Unity Technologies has issued a critical security advisory warning developers about a high-severity vulnerability affecting its widely used game development platform.  The flaw, designated CVE-2025-59489, exposes applications built with vulnerable Unity Editor versions to unsafe file loading attacks that could enable local code execution and privilege escalation across multiple operating … [Read More...]

Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users

Microsoft has announced a significant security enhancement for Outlook users, implementing the retirement of inline SVG image support across Outlook for Web and the new Outlook for Windows platforms.  This change represents a proactive measure to strengthen email security infrastructure and protect users from potential cybersecurity threats. The rollout timeline has been strategically … [Read More...]

5 tips for setting up guest Wi-Fi that isn't a danger to your home

Having guests over is great until they ask for the Wi-Fi password. I'm then faced with the awkward dance of finding that crumpled sticky note, dictating a convoluted string of alphanumeric characters, and hoping they type it in correctly. But the real problem is how guests feel like I'm inviting a security nightmare home. Digitally, handing out my main Wi-Fi password is like giving a stranger a … [Read More...]

Acer Chromebook Plus Spin 514 review: a versatile, convertible powerhouse

A good Chromebook can sometimes be hard to find. Many ChromeOS devices are too underpowered to really do much beyond browse the web and manage your email, or they suffer from poor build quality, dim displays, or uncomfortable keyboards. But that's not the case with the new Acer Chromebook Plus Spin 514. Source: xda-developers.com … [Read More...]

Wolverine: 4 Marvel characters we'd love to see meet up with Logan

During the State of Play presentation for September 2025, Insomniac Game finally gave everyone an official first look at their upcoming Wolverine game. What was very clear from the start was that this would be different from what fans have come to expect from the studio, given their Spider-Man titles were wildly successful. For many people who love Marvel Comics, Wolverine is a character that … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • This survival horror game with 96% positive reviews is at its lowest price ever on Steam, if you're quick
  • Kuttram Purindhavan: The Guilty One OTT Release: Pasupathy’s Gripping Thriller Coming Soon
  • Someone built an ESP32 handheld NES emulator as their "first embedded project," and I wish all my first projects went this well, too
  • Tornado OTT Release Date: When and Where to Watch This British Period Drama Online?
  • New WireTap Attack Break Server SGX To Exfiltrate Sensitive Data

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023