Security Journey Blog
Here you’ll find the latest news, information, and trends in application security and compliance, plus tips and strategies for writing safer code and building a security culture.
Stay Up-to-Date on all Security Journey news and events.
Featured Articles
Empower Your Developers, Secure Your APIs: Free OWASP Top 10 Training
The digital world thrives on APIs, the connectors that power seamless interactions between applications and services....
What You Need To Know About Secure Coding Training for PCI DSS v4.0 Requirements
Learn About ‘Research’
Is Regulation the Consequence of Complacency in Securing Code?
AI AppSec: Can Developers Fight Fire With Fire?
What are the 3 Pillars of Application Security?
Measuring the ROI of AppSec Training [INFOGRAPHIC]
Security Journey provides engaging and effective AppSec training to developers and all members of the SDLC. This infographic breaks down the ROI of AppSec training for an organization with the calculations.
Benefits of Progressive Learning Paths for AppSec Education
Learning is a lifelong journey, no matter your age, and when educational content is built with learning science principles in mind – learning can also be effective.
How Code Scanning Tools Are Letting You Down
Secure Code Training vs. Code Scanning Tools
Is Secure Coding Training a Better Investment Than Code Scanning Tools for Reducing Application Vulnerabilities?
Adopting Long Lasting AppSec Habits For 2023
The new year is traditionally a time to make resolutions and form good habits. It’s an opportunity that many of us take in both our professional and personal lives to adopt better practices and...
The GitHub Supply Chain Threat: What You Need to Know Today
If you’re a GitHub developer that relies on open source repositories in your code (that would be everyone), Tuesday night’s Tweet storm started by Stephen Lacy no doubt caught your attention.
Learning How to Reduce Injection Vulnerabilities Risk in Minutes
Last week, we released our Secure Coding Report: Injection Vulnerabilities, which identifies that training software developers on how to best protect against one of the most critical exploits on the...