Visit HackEDU

HackEDU Blog

Stay up to date

Topic: Secure Coding Training

HackEDU Secure Coding Training

HackEDU Customer Case Study

Software/Technology Industry   Developers Find & Fix 5.6x More Vulnerabilities with HackEDU’s Training   Results Summary Top Benefits Achieved 100% of developers improved...

Continue Reading

Secure Coding Training software security Application Security

Secure Code Review Best Practices

Introduction Static code analysis testing with automated tools can enable analyzing large codebases in minutes and identify a wide range of vulnerabilities. But static analysis tools...

Continue Reading

Secure Coding Training Application Security

How to Run an Effective Application Security Program Remotely

The good news is that running an effective application security program remotely is no different than running it in the office. However, the reality is that most companies are not at the...

Continue Reading

HackEDU Secure Coding Training Secure Development Training

HackEDU Launches Coding Challenges And Secure Coding Assessments

HackEDU has launched Coding Challenges and Secure Coding Assessments for subscribers that are available now!  Coding Challenges are hands-on labs where software developers practice finding...

Continue Reading

Secure Coding Training software security

How to prevent SQL Injection vulnerabilities: How Prepared Statements Work

Introduction SQL Injection is a software vulnerability that occurs when user-supplied data is used as part of a SQL query. Due to improper validation of data, an attacker can submit a valid...

Continue Reading

Secure Coding Training Secure Development Training

How To Create a Successful Secure Coding Training Plan

Developing a secure coding training plan for frontend and backend developers as well as Quality Assurance (QA) engineers can be difficult. How can you develop an effective training plan...

Continue Reading

Secure Coding Training software security Application Security

What is a Secure Software Development Lifecycle & how do you build an appsec program?

And how do you build an application security program? Software development follows what is called a Software Development Lifecycle, or S D L C. It is a process used for developing software....

Continue Reading

Secure Coding Training Secure Development Training Application Security

Why You Need a Vulnerability Disclosure Response Plan & How to Develop One

Background Most companies have an Incident Response Plan these days. With an increasing number of data breaches, having a plan in place is important so that all stakeholders (Security,...

Continue Reading

Secure Coding Training software security Application Security

Common Federated Identity Protocols: OpenID Connect vs OAuth vs SAML 2

Introduction When it comes to federated identity there are three major protocols used by companies: OAuth 2, OpenID Connect, and SAML. In this article we will examine their security...

Continue Reading

HackEDU Secure Coding Training Secure Development Training

Drupalgeddon2 (CVE-2018-7600) Vulnerability

Click here to try hacking the Drupalgeddon2 Vulnerability and learn more with HackEDU's hands-on Drupalgeddon2 application. Introduction Drupal is the second most popular Content Management...

Continue Reading

Stay up to date