A Brighter Future For DevSecOps? It's Closer Than You Think

A Brighter Future For DevSecOps? It’s Closer Than You Think

|
I was delighted to contribute with a number of experts to an insightful article by Suparna Goswami in Data Breach Today. As she points ... Read More
Secure Code Dojo: How to Defeat SQL Injection

Secure Code Dojo: How to Defeat SQL Injection

|
In simple terms, SQL (or Structured Query Language) is the language used to communicate with relational databases; it’s the query ... Read More
Why gamification is the key to leveling up your software security

Why gamification is the key to leveling up your software security

|
AppSec managers, CISOs, CIOs, cybersecurity experts - I’ve spoken to many of them, working in all kinds of companies all over the world - ... Read More
More Breaches, More Problems: The Cost of Trust in Third-Party Apps

More Breaches, More Problems: The Cost of Trust in Third-Party Apps

|
It’s no secret that our main mission is to make software and its development safe; secure from the very beginning of production. Our ... Read More
Celebrating International Women in Engineering Day: Meet Lucy

Celebrating International Women in Engineering Day: Meet Lucy

|
Perhaps we’re speaking with a teensy bit of bias, but here at Secure Code Warrior, we think a career in software development and ... Read More
The forgotten human factor driving web application security flaws

The forgotten human factor driving web application security flaws

|
The 2018 Verizon Data Breach Investigations Report is once again a great read that keeps us up to date on cybersecurity, including ... Read More
Some CISOs are turning the security skills shortage into an opportunity

Some CISOs are turning the security skills shortage into an opportunity

|
As I head to San Francisco this week to attend RSA, I am gearing up for a lot of discussions with CISOs. It may surprise you, but the ... Read More
“Explosive” cyber attacks in Oil and Gas are life threatening

“Explosive” cyber attacks in Oil and Gas are life threatening

|
The focus of most cybersecurity discussions relate to protecting money, reputation and information. Within financial institutions, it is ... Read More
A missed Christmas gift from SD Times

A missed Christmas gift from SD Times

|
Like everyone else coming into 2018, I have a zillion articles and emails I need to catch up on.While working through my list of "to ... Read More
Secure Code Warrior - Happy 3rd Birthday to us

Secure Code Warrior – Happy 3rd Birthday to us

|
27th Jan 2018. Secure Code Warrior’s birthday falls one day after Australia Day. I realised while contemplating another fantastic year ... Read More
Loading...