Security Journey Blog
Here you’ll find the latest news, information, and trends in application security and compliance, plus tips and strategies for writing safer code and building a security culture.

Stay Up-to-Date on all Security Journey news and events.
Featured Articles

Developer-Tailored Secure Code Training: A New Approach from Security Journey
Security training for developers has traditionally been a one-size-fits-all experience—generic, compliance-driven, and...

New Content for Your Most Pressing & Emerging Vulnerabilities: AI/LLM & CWE Top 25
At Security Journey, we continuously evolve our training content to help organizations stay ahead of the most pressing...
HackEDU Platform Tutorial
Top 6 Application Security Must Dos with Limited Resources
The vast majority of application security teams are under resourced. The ideal is that application security teams will scale with development teams, but this rarely happens. Given this disadvantage,...
OWASP Top 10 Mini Series - Command Injection Cheat Sheet
OWASP Top 10 Mini Series - SQL Injection
When Should I Start Secure Development Training?
I know what it is like to have competing priorities. When I was the Chief Information Security Officer at AirMap, there was a constant pressure to build product, and security was always fighting for...
HackEDU Two Time Award Winner
FinancesOnline, one of the most respected and reliable analytical review platforms on today’s B2B market, wrote a very positive HackEDU Security Development Training overview. We are happy to...
Barriers to Start Cybersecurity
The cybersecurity industry is facing a shortage of professionals, in part because of a lack of high-quality and accessible training. Cybersecurity training has several issues that make accessibility...
How Can Compliance Lead to Better Security?
Although compliance gets companies to a minimum standard (whether it is PCI-DSS, HIPAA/HITRUST, NIST 800-53, or ISO 27001), it does not necessarily guarantee security. Unfortunately, instead of...
Compare Codebashing vs. HackEDU
Why an Offensive Approach to Security Training is Effective
How Much Should I Spend on Secure Coding Training?