Psychic Signatures - what you need to know
Where does secure code sit on the list of development team priorities?
How to prevent common Java mistakes
The Log4j vulnerability explained - Its attack vector and how to prevent it
How to convince your boss to invest in secure coding training
Experience the impact of the Path Traversal Vulnerability to blame for the recent Apache woes
Warrior Insider: Nelnet - Nurture your security champions and create a culture of secure development from within
Warrior Insider: Contrast Security - Give developers impactful cybersecurity training with contextual learning
Warrior Insider: Selligent - why cybersecurity matters when scaling your business
Starting "left of left": Is secure code always quality code?
Java Gotchas - Bitwise vs Boolean Operators
What is static analysis?
How to catch and fix a Guice dependency injection issue using Sensei
Coders Conquer Security OWASP Top 10 API Series - Improper Assets Management
My pentester, my enemy? Developers reveal what they really think about pentesting and static analysis results
The future of work is flexible, and it's great for cybersecurity
Coders Conquer Security OWASP Top 10 API Series - Insufficient Logging and Monitoring
Coders Conquer Security OWASP Top 10 API Series - Disabled Security Features/Debug Features Enabled/Improper Permissions
Using Documentation Links with Sensei
Adding Parameters to Annotations Using Rewrite Actions
Coders Conquer Security OWASP Top 10 API Series - Mass Assignment
What is Sensei?
Build secure coding skills at every stage of the SSDLC
Coders Conquer Security OWASP Top 10 API Series - Missing Function Level Access Control
Coders Conquer Security OWASP Top 10 API Series - Lack of Resources and Rate Limiting
ClickShare Vulnerabilities May Have Been Patched, But They Mask a Much Bigger Problem
Coders Conquer Security OWASP Top 10 API Series - Excessive Data Exposure
Coders Conquer Security OWASP Top 10 API Series - Broken Authentication
Expert Interview: Infrastructure as Code with Oscar Quintas
Coders Conquer Security OWASP Top 10 API Series - Broken Object Level Authorization
Death by Doki: A new Docker vulnerability with serious bite (and what you can do about it)
Is your organization really DevSec-ready? Put it to the test.
Strike first, strike hard: Why curated secure coding courses extend no mercy to cyber threats
Want developers to code with security awareness? Bring the training to them.
Stop disrupting my workflow! How you can get the right security training at the right time
Coders Conquer Security Infrastructure as Code Series - Business Logic
Coders Conquer Security Infrastructure as Code Series - Using Components From Untrusted Sources
Cybercriminals Are Attacking Healthcare (But We Can Fight Back)
Coders Conquer Security Infrastructure as Code Series: Security Misconfiguration - Improper Permissions
Coders Conquer Security Infrastructure as Code Series: Insufficient Transport Layer Protection
Coders Conquer Security Infrastructure as Code Series: Insecure Cryptography
Coders Conquer Security Infrastructure as Code Series: Plaintext Storage of Passwords
Coders Conquer Security Infrastructure as Code Series: Missing Function Level Access Control
Coders Conquer Security Infrastructure as Code Series: Disabled Security Features
Turning boring PCI-DSS compliance into a meaningful exercise for everybody: Part 2 - CISOs and developer awareness
Turning boring PCI-DSS compliance into a meaningful exercise for everybody: Part 1 - AppSec
The future of cybersecurity: What WON'T be happening in the year to come
Shifting left is not enough: Why starting left is your key to software security excellence
Why DevOps Implementation is Often Unsuccessful (and How You Can Fix It)
Coders Conquer Security: Share & Learn Series - Insecure Deserialization
Coders Conquer Security: Share & Learn Series - Sensitive Data Exposure
Coders Conquer Security: Share & Learn Series - XXE Injection
Coders Conquer Security: Share & Learn Series - CRLF Injection
Coders Conquer Security: Share & Learn Series - Remote File Inclusion
Coders Conquer Security: Share & Learn Series - Local File Inclusion and Path Traversal
Coders Conquer Security: Share & Learn Series - Insufficient Transport Layer Protection
Coders Conquer Security: Share & Learn Series - XML Injections
Coders Conquer Security: Share & Learn Series - Unvalidated Redirects and Forwards
Coders Conquer Security: Share & Learn Series - Code Injection
Coders Conquer Security: Share & Learn Series - Broken Access Control
For Cybersecurity Best Practice, Look to the Finance Industry
Coders Conquer Security: Share & Learn Series - Information Exposure
Coders Conquer Security: Share & Learn Series - Using Components with Known Vulnerabilities
Coders Conquer Security: Share & Learn Series - Authentication
Coders Conquer Security: Share & Learn Series - Insufficient Anti-Automation
Coders Conquer Security: Share & Learn Series - Business Logic Problems
DevSecOps: The Old Security Bugs Still Performing New Tricks
Coders Conquer Security: Share & Learn Series - Email Header Injection
Coders Conquer Security: Share & Learn Series: Insecure Direct Object Reference
Insecure Cryptographic Storage & Security | Secure Code Warrior
Coders Conquer Security: Share & Learn Series - XQuery Injection
What is Security Misconfiguration? | Secure Code Warrior
Coders Conquer Security: Share & Learn Series - Clickjacking
Coders Conquer Security: Share & Learn Series - OS Command Injection
Coders Conquer Security: Share & Learn Series - Session Management Weaknesses
Coders Conquer Security: Share & Learn Series - Padding Oracle
Coders Conquer Security: Share & Learn Series - LDAP Injections
Coders Conquer Security: Share & Learn Series - Unrestricted File Uploads
Coders Conquer Security: Share & Learn Series - NoSQL Injection
Coders Conquer Security: Share & Learn Series - Cross-Site Request Forgery
Coders Conquer Security: Share & Learn - Cross-Site Scripting
Coders Conquer Security: Share & Learn - SQL Injection
A Brighter Future For DevSecOps? It's Closer Than You Think
More Breaches, More Problems: The Cost of Trust in Third-Party Apps
Some CISOs are turning the security skills shortage into an opportunity
The forgotten human factor driving web application security flaws
Secure Coding Technique: Processing XML data, part 1
One line of code, $1 million
Android Full Device Encryption Technique | Secure Code Warrior
Secure coding technique: Let's talk about Tapjacking
Secure coding technique: The Custom Permission Problem
How-to Avoid Username Enumeration | Secure Code Warrior
Copy/Paste is a dangerous coding technique
Are your developers the first line of risk or defense? Rate your company against our Secure Coding Checklist
Hello from the other side. Interview with a bug bounty hunter.
The million dollar question every developer should be asking their prospective employers
How secure coding guidelines evolve
The difficulty with patching deserialization vulnerabilities
Secure coding technique: Securely deleting files
Contact us today and make software security an intrinsic part of your development process.