What's new in Secure Code Warrior: May 2022
New: Ship secure SAP ABAP code faster with ABAP training content
Zero-day attacks are on the rise. It's time to plan a defensive edge.
Where does secure code sit on the list of development team priorities?
What is Trojan Source and how does it sneak into your source code
Your guide to defense against the dark art of zero-day attacks
Champions vs. coaches: Why every development team needs both
Why scaffolded learning builds security-strong developers
The Log4j vulnerability explained - Its attack vector and how to prevent it
Cybersecurity industry analysis: Another recurring vulnerability we must correct
Is your security program focused on incident response? You're doing it wrong.
Security-aware developers: AppSec needs you!
Future frontiers: Why developers need to go beyond the OWASP Top 10 for secure coding mastery
How to convince your boss to invest in secure coding training
Incentivizing developers is the key to better security practices
Experience the impact of the Path Traversal Vulnerability to blame for the recent Apache woes
Warrior Insider: Nelnet - Nurture your security champions and create a culture of secure development from within
OWASP’s 2021 list shuffle: A new battle plan and primary foe
Elevated security intelligence: Guided courses helping developers get NIST-ready
When good microwaves go bad: Why embedded systems security is the next boss battle for developers
Secure development should be AppSec’s immune system
Buyers Checklist: Secure Development Learning Platforms
Warrior Insider: Contrast Security - Give developers impactful cybersecurity training with contextual learning
Why we must never overlook the human factor in cybersecurity
Leaky APIs threaten to wash company reputations out to sea
Making moves with NIST: Our human-led position on the future of cyber defense
Warrior Insider: Selligent - why cybersecurity matters when scaling your business
Certified security awareness: An Executive Order to elevate developers
A cyberattack occurs every 39 seconds. Is the government finally equipped to fight back?
If AppSec tooling is the silver bullet, why are so many companies not firing it?
Happy birthday SQL injection, the bug that can’t be squashed
Building trust: The path to true security synergy between AppSec and developers
Java Gotchas - Bitwise vs Boolean Operators
For developers to help slay the cybercrime beast, training is a quest in two parts
Coders Conquer Security OWASP Top 10 API Series - Improper Assets Management
Amending Method and Class Visibility for JUnit 5
Automatically Adding a Private Constructor with Sensei
Coders Conquer Security OWASP Top 10 API Series - Insufficient Logging and Monitoring
Coders Conquer Security OWASP Top 10 API Series - Disabled Security Features/Debug Features Enabled/Improper Permissions
Introducing Missions: The next phase of developer-centric security training
Adding Parameters to Annotations Using Rewrite Actions
Coders Conquer Security OWASP Top 10 API Series - Mass Assignment
Coders Conquer Security OWASP Top 10 API Series - Missing Function Level Access Control
Coders Conquer Security OWASP Top 10 API Series - Lack of Resources and Rate Limiting
Coders Conquer Security OWASP Top 10 API Series - Excessive Data Exposure
Coders Conquer Security OWASP Top 10 API Series - Broken Authentication
Coders Conquer Security OWASP Top 10 API Series - Broken Object Level Authorization
Strike first, strike hard: Why curated secure coding courses extend no mercy to cyber threats
Want developers to code with security awareness? Bring the training to them.
Stop disrupting my workflow! How you can get the right security training at the right time
Coders Conquer Security Infrastructure as Code Series - Business Logic
Rust is the most-loved programming language for the fifth time. Is it our new security savior?
Coders Conquer Security Infrastructure as Code Series - Using Components From Untrusted Sources
Cybercriminals Are Attacking Healthcare (But We Can Fight Back)
Coders Conquer Security Infrastructure as Code Series: Security Misconfiguration - Improper Permissions
Coders Conquer Security Infrastructure as Code Series: Insufficient Transport Layer Protection
Coders Conquer Security Infrastructure as Code Series: Insecure Cryptography
COBOL Application Development Security | Secure Code Warrior
Coders Conquer Security Infrastructure as Code Series: Plaintext Storage of Passwords
Coders Conquer Security Infrastructure as Code Series: Missing Function Level Access Control
Coders Conquer Security Infrastructure as Code Series: Disabled Security Features
DevSecOps in DACH: Key findings from secure coding pilot programs
The new NIST guidelines: Why customized training is essential to create secure software
Static Vs. Dynamic Cybersecurity Training: Impulsive Compliance, Future Problems
It takes a village: How community spirit creates more secure developers
Coders Conquer Security: Share & Learn Series - Insecure Deserialization
Contextual, Hands-On Learning: The Supercharged Way to Train Your Brain for Security
Coders Conquer Security: Share & Learn Series - Sensitive Data Exposure
Coders Conquer Security: Share & Learn Series - XXE Injection
Coders Conquer Security: Share & Learn Series - CRLF Injection
How creative CISOs and CIOs can innovate and transform their security program
Coders Conquer Security: Share & Learn Series - Remote File Inclusion
Coders Conquer Security: Share & Learn Series - Local File Inclusion and Path Traversal
Coders Conquer Security: Share & Learn Series - Insufficient Transport Layer Protection
Coders Conquer Security: Share & Learn Series - XML Injections
Coders Conquer Security: Share & Learn Series - Insufficient Logging and Monitoring
Coders Conquer Security: Share & Learn Series - Unvalidated Redirects and Forwards
Coders Conquer Security: Share & Learn Series - Code Injection
GitHub Users Held to Ransom with Plaintext Pain
Coders Conquer Security: Share & Learn Series - Broken Access Control
Coders Conquer Security: Share & Learn Series - Information Exposure
Coders Conquer Security: Share & Learn Series - Using Components with Known Vulnerabilities
Security' is Not a Dirty Word: How a Positive Approach Will Transform Your Security Program
Coders Conquer Security: Share & Learn Series - Authentication
Coders Conquer Security: Share & Learn Series - Insufficient Anti-Automation
Coders Conquer Security: Share & Learn Series - Business Logic Problems
Coders Conquer Security: Share & Learn Series - Email Header Injection
Coders Conquer Security: Share & Learn Series: Insecure Direct Object Reference
Insecure Cryptographic Storage & Security | Secure Code Warrior
Coders Conquer Security: Share & Learn Series - XQuery Injection
Coders Conquer Security: Share & Learn Series - Clickjacking
Coders Conquer Security: Share & Learn Series - OS Command Injection
Coders Conquer Security: Share & Learn Series - Session Management Weaknesses
Developer Tournaments: AppSec's Secret Weapon to Improve Security Culture and Engagement
The Change We Need In The AppSec Badlands: My 2019 Predictions
Coders Conquer Security: Share & Learn Series - Unrestricted File Uploads
Coders Conquer Security: Share & Learn Series - NoSQL Injection
Coders Conquer Security: Share & Learn Series - Cross-Site Request Forgery
Coders Conquer Security: Share & Learn - SQL Injection
Coders Conquer Security: Share & Learn - Cross-Site Scripting
Contact us today and make software security an intrinsic part of your development process.