Security Journey Blog
Here you’ll find the latest news, information, and trends in application security and compliance, plus tips and strategies for writing safer code and building a security culture.
Stay Up-to-Date on all Security Journey news and events.
Featured Articles
Your Guide to Building the Ideal Secure Coding Training Program
Security Journey Study reveals only 20 percent of organizations can confidently detect a vulnerability before an application is released
Learn About ‘Security Culture (5)’
How do you Train Developers in Secure SDLC Practices?
What is a Capture The Flag Event, and How Does It Benefit Developers?
How Security Champions Help Improve Application Security
Application security is a major concern for many organizations. In 2020, over 23,000 new vulnerabilities were discovered and publicly reported in production applications. On average, a codebase ...
How Secure Coding Training Fits Into The Shift Left Movement
In the past, security was not seen as a priority during the development process. Often, developers would only perform vulnerability scans and security audits as part of the testing phase of the...
How to Put the Threat Modeling Manifesto Into Action
If you have not yet seen the Threat Modeling Manifesto, you’re missing out.
How to Shift Left and Increase Long-Term Efficiency
In software development, issues become more time-consuming and more expensive the longer it takes to find and fix them. Find defects too late in the development cycle, and you could risk a delayed...
DevOps Security Culture: 12 Fails Your Team Can Learn From
This post was written by Chris Romeo during his tenure at Security Journey.
This article was originally appeared on at TechBeacon.com on January 6, 2021. You can access it here.
3 Steps To Overcoming the Shortage in Security Talent (Hint: You Already Have What You Need)
According to the 2019/2020 Official Annual Cybersecurity Jobs Report, an estimated 3.5 million cybersecurity jobs will go unfilled in 2021. While attracting candidates from such a limited talent pool...
6 Ways to Develop a Security Culture From Top to Bottom
The Carrot and the Stick: Security Rewards and Recognition
How do you incentivize people to participate in your security program? Are you using a carrot or a stick? Security rewards and recognition are crucial for the success of your security belt program.
Three Ways to Empower Remote Threat Modeling
We’re all living in this new world where we’re working from home. The question we pose is, 'How will we make progress on rolling out threat modeling when we can’t meet with people face to face and...