Security is now "everyone's job," with developers expected to be the first line of defense against cyber threats. But as we pile security responsibilities on developers, let’s ask ourselves: Are they actually prepared for this?
“Shifting left” may just be setting them up for failure.
Developers entered the field to solve problems, build things, and create user experiences. Their training focused on algorithms, data structures, frameworks, and design patterns. Security, if covered at all, was often a brief module on SQL injection and XSS—hardly preparation for the comprehensive threat modeling now expected of them.
Today, our developers are being asked to think like hackers while writing code like engineers. They have to consider user experience, system performance, maintainability, and now dozens of potential attack vectors. This is changing how they code.
Rightly so. But again, are they prepped? We say they are; evidence says otherwise.
Now, walk into most development teams and ask about their security training.
You'll likely find a patchwork of approaches: some developers who attended a security conference, others who completed online modules focused on compliance checkboxes, and many who learned about security reactively—after a vulnerability was discovered in their code.
The typical security training developers receive is focuses on broad concepts rather than the specific, practical skills needed for secure coding. Learning about the OWASP Top 10 is valuable, of course, but it doesn't prepare developers to evaluate every function call, every data transformation, and every user interaction for potential security implications.
Security knowledge feels different from other technical skills.
When developers don't know a programming concept, they can usually research it, experiment, and build understanding incrementally. Security, however, carries the weight of potential disaster. Not knowing how to optimize a database query might slow down an application; not understanding authentication bypass techniques could expose millions of user records. And we’d stake them for that.
This also creates a bit of impostor syndrome. Confident developers suddenly question every coding decision. The fear of being the person who introduced a critical vulnerability adds psychological pressure that many aren't prepared for.
Even willing developers fail because we haven't adapted to support security-first development. They lack access to security tools, threat modeling resources, or security expertise. Code review processes focus on functionality and style but lack security depth. Development timelines don’t consider the additional time needed to implement security.
When we ask for secure code but fail to provide the environment, training, and support necessary to achieve it, we create a perfect storm of stress and inefficiency.
The human brain has limited processing capacity. When we ask developers to maintain constant security awareness on top of their existing responsibilities, something has to give. Many report that security considerations slow down their development process, not just because of additional steps, but because of the mental overhead of constantly switching between creative problem-solving mode and threat assessment mode.
What does that mean?
The security-first movement isn't wrong; it's necessary.
But the current way sets developers up for failure. Recognising that is the first step. Next.
Rather than assuming developers can seamlessly absorb security responsibilities, we need to invest in practical security education or tools that builds genuine competence rather than compliance theater. We need to create development environments that support security thinking with tools, processes, and expertise.
Easier said than done, huh?
Well with tools that help developers see exactly where the loophole is and give them automatic fixes, with business context, that transition from developer to secure developer moves 5 times faster with minimal mental load.
But until organizations address the readiness gap constructively, they're asking developers to navigate a transition they may not have been fully prepared for.