Why financial institutions are leading the charge to upskill their developers in secure coding

Why financial institutions are leading the charge to upskill their developers in secure coding

|
Last week, Secure Code Warrior delivered a webinar on a very interesting evolution we have observed: the rising innovation and leadership ... Read More
Why SQL Injections Are The Cockroaches of the AppSec World (and how CISOs can eradicate them once and for all)

Why SQL Injections Are The Cockroaches of the AppSec World (and how CISOs can eradicate them once and for all)

|
There’s a well-known theory that cockroaches can survive basically anything - even a nuclear explosion. While that theory only rings true ... Read More
A Brighter Future For DevSecOps? It's Closer Than You Think

A Brighter Future For DevSecOps? It’s Closer Than You Think

|
I was delighted to contribute with a number of experts to an insightful article by Suparna Goswami in Data Breach Today. As she points ... Read More
Secure Code Dojo: How to Defeat SQL Injection

Secure Code Dojo: How to Defeat SQL Injection

|
In simple terms, SQL (or Structured Query Language) is the language used to communicate with relational databases; it’s the query ... Read More
Why gamification is the key to leveling up your software security

Why gamification is the key to leveling up your software security

|
AppSec managers, CISOs, CIOs, cybersecurity experts - I’ve spoken to many of them, working in all kinds of companies all over the world - ... Read More
More Breaches, More Problems: The Cost of Trust in Third-Party Apps

More Breaches, More Problems: The Cost of Trust in Third-Party Apps

|
It’s no secret that our main mission is to make software and its development safe; secure from the very beginning of production. Our ... Read More
Celebrating International Women in Engineering Day: Meet Lucy

Celebrating International Women in Engineering Day: Meet Lucy

|
Perhaps we’re speaking with a teensy bit of bias, but here at Secure Code Warrior, we think a career in software development and ... Read More
The forgotten human factor driving web application security flaws

The forgotten human factor driving web application security flaws

|
The 2018 Verizon Data Breach Investigations Report is once again a great read that keeps us up to date on cybersecurity, including ... Read More
Some CISOs are turning the security skills shortage into an opportunity

Some CISOs are turning the security skills shortage into an opportunity

|
As I head to San Francisco this week to attend RSA, I am gearing up for a lot of discussions with CISOs. It may surprise you, but the ... Read More
“Explosive” cyber attacks in Oil and Gas are life threatening

“Explosive” cyber attacks in Oil and Gas are life threatening

|
The focus of most cybersecurity discussions relate to protecting money, reputation and information. Within financial institutions, it is ... Read More