Security Journey Blog
Here you’ll find the latest news, information, and trends in application security and compliance, plus tips and strategies for writing safer code and building a security culture.

Stay Up-to-Date on all Security Journey news and events.
Featured Articles

Developer-Tailored Secure Code Training: A New Approach from Security Journey
Security training for developers has traditionally been a one-size-fits-all experience—generic, compliance-driven, and...

New Content for Your Most Pressing & Emerging Vulnerabilities: AI/LLM & CWE Top 25
At Security Journey, we continuously evolve our training content to help organizations stay ahead of the most pressing...
Posts by Security Journey/HackEDU Team
HackEDU Adaptive Training Plans
The Carrot and the Stick: Security Rewards and Recognition
How do you incentivize people to participate in your security program? Are you using a carrot or a stick? Security rewards and recognition are crucial for the success of your security belt program.
Security Coaches
NOTE: This article is written based on a conversation on the Application Security Podcast with Matt McGrath, called “Security Coaches."
Threat modeling: Better Caught Than Taught
Everyone wants their engineering staff to be better at threat modeling. Security teams desire a world where developers practice a threat modeling mindset. A threat modeling mindset is where threat...
HackEDU Customer Case Study
Developers Find & Fix 5.6x More Vulnerabilities with HackEDU's Training: HackEDU Case Study.
OWASP API Security Top 10: Get Your Dev Team Up to Speed
This post was written by Chris Romeo during his tenure at Security Journey.
Marc Andreessen famously stated in 2011 that “software is eating the world.” Now, in 2019, application programming...
A Security Practitioner's Guide to Software Obsolescence
This post was written by Chris Romeo during his tenure at Security Journey.
Unlike wine and cheese, software does not get better with age—in fact, its security strength decreases over time. This is...
How to do Application Security on a Budget
This post was written by Chris Romeo during his tenure at Security Journey.
As a bit of a thought experiment, I asked myself, “What if I had to develop an application security program with a budget...
A Trusted Insider's Buyers Guide to SCA
This series was born from an interview on the Application Security Podcast, season 5, episode 18. On this episode, Chris and Robert interviewed Steve Springett about the world of the secure supply...
Tips for Application Security Program Building
This article was born from an interview on the Application Security Podcast, season 5, episode 19 between Brook Schoenfeld and Chris Romeo / Robert Hurlbut. We began the conversation talking about...
Software Supply Chain Risk and SCA -- Part One
This series was born from an interview on the Application Security Podcast, season 5, episode 18. Chris and Robert interviewed Steve Springett about the world of the secure supply chain. In part...