Security Journey Blog
Here you’ll find the latest news, information, and trends in application security and compliance, plus tips and strategies for writing safer code and building a security culture.
Stay Up-to-Date on all Security Journey news and events.
Featured Articles
Empower Your Developers, Secure Your APIs: Free OWASP Top 10 Training
The digital world thrives on APIs, the connectors that power seamless interactions between applications and services....
What You Need To Know About Secure Coding Training for PCI DSS v4.0 Requirements
Learn About ‘Application Security (7)’
SAST vs DAST vs IAST
In the last twenty years, software applications have changed the way we work or do business. Software and in particular web applications store and handle increasingly more sensitive data. According...
How to Run an Effective Application Security Program Remotely
The good news is that running an effective application security program remotely is no different than running it in the office. However, the reality is that most companies are not at the point of...
How to prevent SQL Injection Vulnerabilities: How Prepared Statements Work
SQL Injection is a software vulnerability that occurs when user-supplied data is used as part of a SQL query. Due to improper validation of data, an attacker can submit a valid SQL statement that changes the logic of the initial query used by the application.
PCI Secure Software Lifecycle (Secure SLC)
Ever since its formation in 2006, the PCI Security Standards Council (PCI SSC) has worked to improve the security of payment solutions and protect merchants against the latest security threats. In...
How to Go Beyond PCI Compliance to Secure Your Organization: Requirements 8-12
How to Go Beyond PCI Compliance to Secure Your Organization: Requirements 4-7
In the second installment in this series, we introduced how payment processing works and explained the first three PCI requirements. In this post we will explore the next four PCI DSS requirements,...
How to Go Beyond PCI Compliance to Secure Your Organization: Requirements 1-3
In the first post of this series, we discussed the Payment Card Industry Data Security Standard (PCI DSS), why it is important, and what the consequences are of being non-compliant. We also explained...
How to Go Beyond PCI Compliance Requirements to Secure Your Organization: Introduction
In 2000, the number of websites skyrocketed to 17 million, with more than 400 million internet users. Shortly after, a growing number of online stores came online, eager to capitalize on the...