Why financial institutions are leading the charge to upskill their developers in secure coding
Last week, Secure Code Warrior delivered a webinar on a very interesting evolution we have observed: the rising innovation and leadership ... Read More
Why SQL Injections Are The Cockroaches of the AppSec World (and how CISOs can eradicate them once and for all)
There’s a well-known theory that cockroaches can survive basically anything - even a nuclear explosion. While that theory only rings true ... Read More
A Brighter Future For DevSecOps? It’s Closer Than You Think
I was delighted to contribute with a number of experts to an insightful article by Suparna Goswami in Data Breach Today. As she points ... Read More
Secure Code Dojo: How to Defeat SQL Injection
In simple terms, SQL (or Structured Query Language) is the language used to communicate with relational databases; it’s the query ... Read More
Why gamification is the key to leveling up your software security
AppSec managers, CISOs, CIOs, cybersecurity experts - I’ve spoken to many of them, working in all kinds of companies all over the world - ... Read More
More Breaches, More Problems: The Cost of Trust in Third-Party Apps
It’s no secret that our main mission is to make software and its development safe; secure from the very beginning of production. Our ... Read More
Celebrating International Women in Engineering Day: Meet Lucy
Perhaps we’re speaking with a teensy bit of bias, but here at Secure Code Warrior, we think a career in software development and ... Read More
The forgotten human factor driving web application security flaws
The 2018 Verizon Data Breach Investigations Report is once again a great read that keeps us up to date on cybersecurity, including ... Read More
Some CISOs are turning the security skills shortage into an opportunity
As I head to San Francisco this week to attend RSA, I am gearing up for a lot of discussions with CISOs. It may surprise you, but the ... Read More
“Explosive” cyber attacks in Oil and Gas are life threatening
The focus of most cybersecurity discussions relate to protecting money, reputation and information. Within financial institutions, it is ... Read More