Security Journey Blog
Here you’ll find the latest news, information, and trends in application security and compliance, plus tips and strategies for writing safer code and building a security culture.
![Woman with laptop](https://www.securityjourney.com/hs-fs/hubfs/assets/images/spacer.png?width=652&height=840&name=spacer.png)
Stay Up-to-Date on all Security Journey news and events.
Featured Articles
![Read more about 'Your Guide to Building the Ideal Secure Coding Training Program'](https://www.securityjourney.com/hs-fs/hubfs/assets/images/spacer.png?width=600&height=340&name=spacer.png)
Your Guide to Building the Ideal Secure Coding Training Program
![Read more about 'Security Journey Study reveals only 20 percent of organizations can confidently detect a vulnerability before an application is released'](https://www.securityjourney.com/hs-fs/hubfs/assets/images/spacer.png?width=600&height=340&name=spacer.png)
Security Journey Study reveals only 20 percent of organizations can confidently detect a vulnerability before an application is released
Learn About ‘Application Security (2)’
5 Tips for Successful Cybersecurity Threat Modeling at Your Organization
With cybersecurity regularly getting the spotlight, focusing on securing our systems and data has become essential. One of the most efficient ways to start this is with threat modeling. This...
How To Use Threat Modeling to Minimize the Attack Surface of Your Application
Make AppSec Training Accessible for Everyone with WCAG
Boost Your Security with These 3 Game-Changing Threat Modeling Tools
In this blog post, we will explore three top threat modeling tools: Microsoft Threat Modeling Tool, IriusRisk, and OWASP Threat Dragon.
Top 10 Biggest Security Threats to Your Products
Practical Threat Model Creation: A Step-by-Step Guide & Free Template
Enhance Your Security: Unveiling the 3 Key Benefits of Threat Modeling
It is crucial to prioritize security throughout the entire lifecycle of a product or application, from conception to release. Threat modeling is an essential step in this process.
Building an Effective AppSec Education Program: A Step-by-Step Guide
What You Need to Know About Security Journey’s Recommended Learning Paths
The Value of Security Education for Developers
4 Examples of Security Champion Activities
This article will review four activities for security champions to complete within their organization.