Why Us
Product
Security Dojo
White Belt
Yellow Belt
Green Belt
Black & Brown Belt
Experiments Engine
Journey Vulnerable App
Journey Vulnerable Code
Journey Tournaments Mode
Journey+
Catalog
Languages & Technologies
Swift
DevSecOps
Ruby
Python
TypeScript
C#/.Net
Web Application Security Testing
C/C++
API
R
AWS
JavaScript/Node.js
Docker
Kubernetes
Java
Mobile General
Kotlin
Terraform
GO
PHP
Resources
Resources Overview
Blog
Webinars
eBooks
AppSec Podcast
Hi/5 Podcast
Company
About
Our Founder
Team
Careers
Contact
Let's Talk
Login
Let's Talk
Login
Chris Romeo
Co-Founder, Chief Security Officer
Learn more about
Chris Romeo
News and Announcements
Introducing Our New UI: A Simplified Experience to Enhance Learner Engagement
News and Announcements
Security Journey has been Acquired! – We're Joining Forces with HackEDU.
AppSec Training Strategies
AppSec Things to Watch in 2022
Technical
OWASP Top 10 2021: 7 action items for app sec teams
Technical
A developer's guide to attacker motivation in the supply chain
Technical
Why cybersecurity pros need to learn how to code
AppSec Training Strategies
Why developers dislike security—and what you can do about it
Security Culture
How to put the Threat Modeling Manifesto into action
Security Journey
What I Learned in Year 5 of MY Security Journey – It's now OUR Journey!
Security Culture
DevOps security culture: 12 fails your team can learn from
Security Culture
6 ways to develop a security culture from top to bottom
Security Journey
Correct answers in our security belt programs
Security Culture
The carrot and the stick: Security rewards and recognition
Technical
Security coaches
Technical
Threat modeling: better caught than taught
Technical
OWASP API Security Top 10: Get your dev team up to speed
Technical
A security practitioner's guide to software obsolescence
Technical
How to do application security on a budget
Technical
A trusted insider's buyers guide to SCA
Technical
Tips for application security program building
Technical
Software supply chain risk and SCA -- part one
Security Culture
Three ways to empower remote threat modeling
Technical
You cannot hack yourself secure
Security Culture
4 steps to transforming developers into security people
Technical
The state of DevSecOps: 5 best practices from the front lines
Security Culture
How to hack your security culture
AppSec Training Strategies
How do you start in cybersecurity?
Technical
Secure Development Lifecycle: The essential guide to safe software pipelines
AppSec Training Strategies
How developers can take the lead on security
Technical
How to put the S (for security) into your IoT development
Technical
Why OWASP's Threat Dragon will change the game on threat modeling
Technical
The 3 most crucial security behaviors in DevSecOps
Technical
A primer on secure DevOps: Why DevSecOps matters
AppSec Training Strategies
4 ways to engage developers who couldn't care less about security
Security Culture
Information security needs community: 6 ways to build up your teams
Technical
Tech firms take different security approaches than others. That's good and bad
AppSec Training Strategies
6 application security lessons every team should study
Need more information about Security Journey?
Get in touch.
Ready to start your journey?
Book a Demo