Visit HackEDU

HackEDU Blog

Stay up to date

software security Application Security DevSecOps

Same-Origin Policy And Cross-Origin Resource Sharing (CORS)

Introduction Modern web browsers provide many built-in security mechanisms to defend against attackers. Same-origin policy, Cookie Policy, Content Security Policy, browser sandbox, and XSS...

Continue Reading

Secure Coding Training software security Application Security

What is a Secure Software Development Lifecycle & how do you build an appsec program?

And how do you build an application security program? Software development follows what is called a Software Development Lifecycle, or S D L C. It is a process used for developing software....

Continue Reading

Secure Coding Training Secure Development Training Application Security

Why You Need a Vulnerability Disclosure Response Plan & How to Develop One

Background Most companies have an Incident Response Plan these days. With an increasing number of data breaches, having a plan in place is important so that all stakeholders (Security,...

Continue Reading

Secure Coding Training software security Application Security

Common Federated Identity Protocols: OpenID Connect vs OAuth vs SAML 2

Introduction When it comes to federated identity there are three major protocols used by companies: OAuth 2, OpenID Connect, and SAML. In this article we will examine their security...

Continue Reading

Application Security DevSecOps

DevSecOps Best Practices

You’ve decided to integrate DevSecOps into your software development operations. That’s an important first step to improving your product’s overall security by including it into the...

Continue Reading

Application Security DevSecOps

What Is DevSecOps?

DevOps, that combination of software development and IT operations, is designed to improve the development life cycle, getting software to market quicker and improve overall deployment. But...

Continue Reading

PCI Compliance

What Is PCI Compliance?

If your company accepts credit card payments, you should be familiar with PCI DSS compliance. You may also think that your company is so small or so few of your financial transactions...

Continue Reading

HackEDU Secure Development Training

HackEDU Launches New Challenges and a Capture the Flag Competition (CTF)

HackEDU has launched nine new challenges at all difficulty levels. The challenges expand on HackEDU's cybersecurity lessons. Try to read encoded messages, steal bitcoin, outsmart a hacker,...

Continue Reading

Application Security Security Champion

What Are Security Champion Responsibilities?

Your company has decided to add security champions to improve your overall security postures, and you’ve chosen great candidates to take on this role. The next step is to define the...

Continue Reading

HackEDU Secure Coding Training Secure Development Training

Drupalgeddon2 (CVE-2018-7600) Vulnerability

Click here to try hacking the Drupalgeddon2 Vulnerability and learn more with HackEDU's hands-on Drupalgeddon2 application. Introduction Drupal is the second most popular Content Management...

Continue Reading

Stay up to date