Visit Security Journey

Post listing page

Secure Coding Training tips

Top 4 Ways To Increase Completion Rates for Secure Coding Training

  It’s indisputable: Secure Coding Training is effective in reducing vulnerabilities in code. That’s why more and more companies are turning to this training to help speed up software...

Continue Reading

Secure Coding Training guide

Announcing our Secure Coding Training Guide

  We’ve talked to hundreds of secure coding training administrators over the years, and we’ve seen many approaches to setting up and deploying a secure coding training program. We’ve seen...

Continue Reading

Secure Coding Training learning science principles

Applying Learning Science Principles to Secure Code Training

  Everyone knows the old adage: You can lead a horse to water but you can’t make it drink, and this is certainly applicable when it comes to self-directed learning through computer-based...

Continue Reading

Technical

AWS Security: Why you should use IAM roles for access control

Nobody appreciates the words "best practice," especially when they have no idea why it is or who said it. The phrase has encroached on the territory formerly occupied by the adage "in my...

Continue Reading

Secure Coding Training defensive training offensive training

How Offensive Training Improves Defensive-Only Approaches in Secure Coding Training

  “I used to attack because it was the only thing I knew. Now I attack because I know it works best.” - Garry Kasparov, chess legend   Chess is an oft-used analogy for cybersecurity...

Continue Reading

Security Culture

How to put the Threat Modeling Manifesto into action

This article was originally appeared on TechBeacon.com on February 16, 2021. You can access it here.   If you have not yet seen the Threat Modeling Manifesto, then you’re missing out. The...

Continue Reading

Technical

Supply chain insecurity: Keep your eyes on the road with Ruby on Rails

This article was originally appeared on TechBeacon.com on April 26, 2021. You can access it here.   The software supply chain has gotten more attention than usual in the past months, as...

Continue Reading
Gender Diversity Considerations in Training: Avoiding Unintended Biases

When deciding which secure coding training program is right for you and your team, it’s important to choose a program that won’t unintentionally alienate certain groups. In 2021, it’s...

Continue Reading

Technical

Application Security and the Zen of Python

What shall we make of the Zen of Python? Is it the epos of the language? A philosophy of computing? There are those days when one wonders whether the Python language itself is an elaborate...

Continue Reading

Security Journey

What I Learned in Year 5 of MY Security Journey – It's now OUR Journey!

While the year 2020 is not one we'll soon forget, this was a year of extreme growth for Security Journey. We doubled in size, from four people to nine. (And yes, we did this without...

Continue Reading