Security Journey Blog
Here you’ll find the latest news, information, and trends in application security and compliance, plus tips and strategies for writing safer code and building a security culture.
Stay Up-to-Date on all Security Journey news and events.
Featured Articles
Your Guide to Building the Ideal Secure Coding Training Program
Security Journey Study reveals only 20 percent of organizations can confidently detect a vulnerability before an application is released
Learn About ‘Secure Coding Training (7)’
How do you Train Developers in Secure SDLC Practices?
How do you Practice Secure Coding?
What is the S-SDLC or Secure SDLC?
Finding Vulnerabilities: Differences among Vulnerability Scanning, Pen Testing, Bug Bounty, Red Team and Purple Team Compared
When designing systems to be impervious to outside activity, you should always aim to be at least two steps ahead of your adversaries. Whatever it is that you want to protect, whether it’s a physical...
What Are Git Hooks?
Hooks are scripts that run at different steps during the commit process. They are completely customizable and will trigger events at key points during the development life cycle. Some examples of...
What is a Capture The Flag Event, and How Does It Benefit Developers?
What Are Bug Bounty Programs, And Why Are They Becoming So Popular?
Some organizations run bug bounty programs as a way to identify and fix vulnerabilities within their production applications. A bug bounty program gives ethical hackers permission to test if an...
How Secure Coding Training Fits Into The Shift Left Movement
In the past, security was not seen as a priority during the development process. Often, developers would only perform vulnerability scans and security audits as part of the testing phase of the...
Top 4 Ways To Increase Completion Rates for Secure Coding Training
It’s indisputable: Secure Coding Training is effective in reducing vulnerabilities in code. That’s why more and more companies are turning to this training to help speed up software deployment and...
Announcing our Secure Coding Training Guide
We’ve talked to hundreds of secure coding training administrators over the years, and we’ve seen many approaches to setting up and deploying a secure coding training program. We’ve seen what works...