What's new in Secure Code Warrior: May 2022
Where does secure code sit on the list of development team priorities?
What is Trojan Source and how does it sneak into your source code
The Log4j vulnerability explained - Its attack vector and how to prevent it
Deep-Dive Product Demonstration - Scaffolded Learning
How to convince your boss to invest in secure coding training
Secure development should be AppSec’s immune system
Embedded devices and embedded systems development - an overview
MISRA C 2012 vs MISRA C2 - How to make a switch
Why end-to-end security is important for embedded systems
Why we must never overlook the human factor in cybersecurity
The rise of DevSecOps – and what 'shifting left' really means for your organization.
Shifting from reaction to prevention: The changing face of software security 2021 - Whitepaper
Ship quality code faster, with confidence: the transformative power of secure coding practices.
Secure code training = better code + faster release dates
Realigning your organization around secure coding – barriers, concerns, and active solutions
What keeps development teams up at night when it comes to secure coding?
Managers and security champions – the pied pipers and critical influencers of secure coding practices.
Why secure code is the new success metric in software development
How to configure secure code training for better secure coding outcomes
Current secure code training is letting developers down
Why secure code training doesn’t stack up (and what you can do about it)
Developers have motivations to learn about secure coding…so why aren’t they?
What part does the human element play in the future of secure coding?
We need heroes to secure our code. Have developers got what it takes?
Shifting the focus from reactive to proactive, with human-led secure coding
Confusing Privacy with Security: The Fatal Mistake
Why financial institutions are leading the charge to upskill their developers in secure coding
Celebrating International Women in Engineering Day: Meet Lucy
ASRG's push for automotive software security
Contact us today and make software security an intrinsic part of your development process.