Visit HackEDU

HackEDU Blog

Stay up to date

Secure Coding Training Application Security

OWASP Top 10 Mini Series - Command Injection

Introduction Command injection is similar to SQL injection, but instead of injecting into a SQL query, you are injecting a command into the Operating System. User data can be input to...

Continue Reading

Secure Coding Training Application Security

OWASP Top 10 Mini Series - SQL Injection

Introduction SQL Injection vulnerability allows attackers to alter database queries to take actions other than what the developer intended. This could allow an attacker to bypass...

Continue Reading
When Should I Start Secure Development Training?

I know what it is like to have competing priorities. When I was the Chief Information Security Officer at AirMap, there was a constant pressure to build product, and security was always...

Continue Reading

HackEDU

HackEDU Two Time Award Winner

FinancesOnline, one of the most respected and reliable analytical review platforms on today’s B2B market, wrote a very positive HackEDU Security Development Training overview. We are happy...

Continue Reading

HackEDU

Barriers to Start Cybersecurity

The cybersecurity industry is facing a shortage of professionals, in part because of a lack of high-quality and accessible training. Cybersecurity training has several issues that make...

Continue Reading

PCI Compliance

How Can Compliance Lead to Better Security?

Although compliance gets companies to a minimum standard (whether it is PCI-DSS, HIPAA/HITRUST, NIST 800-53, or ISO 27001), it does not necessarily guarantee security. Unfortunately,...

Continue Reading

Secure Coding Training Secure Development Training

Compare Codebashing vs. HackEDU

HackEDU customers often ask us, “What is the difference between Codebashing and HackEDU?” This is a very good question because both Codebashing and HackEDU offer similar training products,...

Continue Reading

Secure Coding Training Secure Development Training

Why an Offensive Approach to Security Training is Effective

There is a saying in security that defenders have to be right 100% of the time, but attackers only have to be right once. While this may be an oversimplification, it illustrates that...

Continue Reading

Secure Coding Training Secure Development Training

How Much Should I Spend on Secure Coding Training?

Customers come to us at HackEDU and ask “How much should I spend on Secure Coding Training?” This is a very good question - we can certainly understand the need to know how much to spend...

Continue Reading

Application Security

When should I launch a bug bounty program?

Bug bounty programs - where individuals can receive recognition and compensation for reporting security vulnerabilities - are useful for organizations, especially when developing an...

Continue Reading

Stay up to date