What happened
On 16 Nov 2025 the National Security Agency (NSA) and Cybersecurity & Infrastructure Security Agency (CISA) issued a joint Cybersecurity Information Sheet urging wider adoption of memory‐safe programming languages (Rust, Go, Swift, Java, etc.) to reduce software vulnerabilities. That federal guidance, together with rising enterprise reporting and tooling momentum, is pushing memory safety from a best practice toward an expected baseline for new code.
Why this matters
Policy + market shift: stronger baseline for software security.
The NSA/CISA guidance says memory-safety bugs remain the “most common” root cause of severe incidents, exposing systems to data breaches, crashes and operational disruption. The article cites Google/Android data showing a drop in memory‐vulnerability incidents for new code from roughly 76% (2019) to 24% (2024) after migrating new development toward Rust — evidence that adopting memory‐safe languages can materially cut risk without rewriting legacy C/C++ at once.
Organizations should expect:
- Engineering impact: prefer memory‐safe languages for new modules, use careful FFI and isolation for legacy C/C++.
- Operational & procurement impact: CTOs, security teams, insurers and regulators may increasingly require memory‐safety roadmaps for critical systems.
- Costs & trade-offs: rewrites are often infeasible; challenges include real‐time/performance constraints, immature niche tooling, and a skills gap (Rust learning curve).
Short term priorities are pragmatic: prioritize high‐risk components (networking, drivers, auth), invest in tooling (static analysis, fuzzing), and build training/hiring plans. The article estimates about 80% confidence that memory‐safe languages will become baseline expectation in critical domains within 1–2 years.
Sources
- NSA/CISA joint Cybersecurity Information Sheet (press release) — “Memory Safe Languages: Reducing Vulnerabilities in Modern Software Development” (16 Nov 2025): nsa.gov
- Coverage summarizing the guidance and adoption trends (CPO Magazine): cpomagazine.com