Visit HackEDU

HackEDU Blog

Stay up to date

Secure Coding Training software security Application Security

Secure Code Review Best Practices

Introduction Static code analysis testing with automated tools can enable analyzing large codebases in minutes and identify a wide range of vulnerabilities. But static analysis tools...

Continue Reading

software security Application Security

SAST vs DAST vs IAST

In the last twenty years, software applications have changed the way we work or do business. Software and in particular web applications store and handle increasingly more sensitive data....

Continue Reading

Secure Coding Training Application Security

How to Run an Effective Application Security Program Remotely

The good news is that running an effective application security program remotely is no different than running it in the office. However, the reality is that most companies are not at the...

Continue Reading

HackEDU Secure Coding Training Secure Development Training

HackEDU Launches Coding Challenges And Secure Coding Assessments

HackEDU has launched Coding Challenges and Secure Coding Assessments for subscribers that are available now!  Coding Challenges are hands-on labs where software developers practice finding...

Continue Reading

Secure Coding Training software security

How to prevent SQL Injection vulnerabilities: How Prepared Statements Work

Introduction SQL Injection is a software vulnerability that occurs when user-supplied data is used as part of a SQL query. Due to improper validation of data, an attacker can submit a valid...

Continue Reading

Secure Coding Training Secure Development Training

How To Create a Successful Secure Coding Training Plan

Developing a secure coding training plan for frontend and backend developers as well as Quality Assurance (QA) engineers can be difficult. How can you develop an effective training plan...

Continue Reading

software security PCI Compliance

PCI Secure Software Lifecycle (Secure SLC)

Introduction Ever since its formation in 2006, the PCI Security Standards Council (PCI SSC) has been striving to increase the security of the payment solutions and protect merchants against...

Continue Reading

software security PCI Compliance

How to Go Beyond PCI Compliance to Secure Your Organization: Requirements 8-12

In the previous articles, we discussed the first seven PCI DSS requirements and how to go above what is required in order to increase security. In this article, we talk about the last five...

Continue Reading

software security PCI Compliance

How to Go Beyond PCI Compliance to Secure Your Organization: Requirements 4-7

In the previous article, we discussed how the payment processing works and the first three PCI requirements. In this post we will explore the next four PCI DSS requirements. Requirement 4:...

Continue Reading

software security PCI Compliance

How to Go Beyond PCI Compliance to Secure Your Organization: Requirements 1-3

In the first post of this series, we discussed the Payment Card Industry Data Security Standard (PCI DSS), why it is important, and what the consequences are of being non-compliant. In...

Continue Reading

Stay up to date