Security Journey Blog
Here you’ll find the latest news, information, and trends in application security and compliance, plus tips and strategies for writing safer code and building a security culture.
Stay Up-to-Date on all Security Journey news and events.
Featured Articles
Security Journey Unveils Developer Manifesto as the Foundation for a Reimagined Platform in the Age of AI
The manifesto guides a developer-first platform experience with hands-on AI/LLM security training, GitHub-driven risk...
5 Types of Data You Should NEVER Share with AI
What Does the Rise of Vibe Coding Mean for Shift Left?
THIS ARTICLE WAS WRITTEN BY MICHAEL BURCH FOR SDTIMES.COM
For much of software security history, development has followed a well-defined pattern: humans wrote code, tools checked it, humans reviewed...
The Rise of AI Agents: How OpenClaw Turns Prompts Into Action
Most people still think of AI as a tool to answer questions. You ask a question, get a response, and move on. Maybe it’s useful, or at least it’s mostly right. Either way, the interaction usually...
Security From Chance to Choice: Navigating Cybersecurity as a Female Leader
THIS ARTICLE ORIGINALLY APPEARED ON SHECANCODE.IO
"If you had asked me in middle school whether I envisioned myself pursuing a career in cybersecurity, my answer would’ve been a definitive no."
...
Code Leaks in 2026: Causes and Prevention In The Age of AI
Broken Access Control: Definition, Examples, and How to Defend Against It
Top 10 Open Source Software Security Risks and How To Mitigate Them
What a Cross-Site Scripting (XSS) Vulnerability Is and How To Manage It
The Most Common AI-Powered Cyberattacks and How To Protect Against Them
Prompt Injection Attacks in LLMs: What Developers Need To Know In 2026
A Guide to Third-Party Dependency Security for Developers
Third-party dependencies are now one of the largest sources of risk in modern software development. More than 80% of modern applications rely on third-party code, and while this might look normal,...
The Security Risks of AI-Generated Code and How To Manage Them