Train through a variety of training types from explanation videos to hands-on challenges, from easy to fiendishly hard.
Create customized curriculums, assess skills, or run a tournament with hands-on training that engages developers.
We offer training a wide variety of different languages and cover all the latest vulnerabilities.
Secure Code Warrior turns 8: All aboard the rocket ship
Are we mature enough for the Open Source Software Security Mobilization Plan?
Seven years of Secure Code Warrior, and it’s starting to feel real
Incentivizing developers is the key to better security practices
Securing APIs: Mission impossible?
API on Wheels: A road trip of risky vulnerabilities
Is your security program focused on incident response? You're doing it wrong.
Lifting the veil on cyber vulnerabilities in Government supply chain pipelines
Leaky APIs threaten to wash company reputations out to sea
Cybersecurity industry analysis: Another recurring vulnerability we must correct
Certified security awareness: An Executive Order to elevate developers
Six Years of Secure Code Warrior: Are we grown up yet?
2021 cybersecurity predictions: The intergalactic battle begins
How the Australian Government can build national cybersecurity resilience and stand tall against threats
International Women in Engineering Day: Meet Our Stars
COVID-19 contact tracing: What's the secure coding situation?
Cybercriminals Are Attacking Healthcare (But We Can Fight Back)
The future of cybersecurity: What WON'T be happening in the year to come
Shifting left is not enough: Why starting left is your key to software security excellence
DevSecOps in DACH: Key findings from secure coding pilot programs
The most dangerous software errors of 2019: More evidence of history repeating
The growth spurt: Happy 5th birthday, Secure Code Warrior
Why DevOps Implementation is Often Unsuccessful (and How You Can Fix It)
The new NIST guidelines: Why customized training is essential to create secure software
OWASP AppSec Day 2019: Nurturing Secure Developers
Static Vs. Dynamic Cybersecurity Training: Impulsive Compliance, Future Problems
It takes a village: How community spirit creates more secure developers
In-depth security training is raising questions in education
Women in Security: Spotlight on Fatemah Beydoun
Empathy, Gratitude, and Staying Humble: The Foundation of Our Culture
Why we need to support, not punish, curious security minds
The Great Global Patch: VxWorks Flaws Set to Compromise Millions of Devices
How creative CISOs and CIOs can innovate and transform their security program
The Revamped PCI Security Standards Council Guidelines: Do They Shift Far Enough Left?
COBOL Application Development Security | Secure Code Warrior
Huawei security UK problems demonstrate the need for secure coding
Best of the Brunch: Our Leaders in AppSec Share Their Wisdom
Secure Code Warrior and Bugcrowd: A Match Made in Security Geek Heaven
GitHub Users Held to Ransom with Plaintext Pain
For Cybersecurity Best Practice, Look to the Finance Industry
DevSecOps: The Old Security Bugs Still Performing New Tricks
Software Security is in the Wild West (and it's going to get us killed)
Happy 4th Birthday Secure Code Warrior, You Cheeky Little Toddler
Developer Tournaments: AppSec's Secret Weapon to Improve Security Culture and Engagement
The Change We Need In The AppSec Badlands: My 2019 Predictions
Secure Code Warrior - Happy 3rd Birthday to us
Some CISOs are turning the security skills shortage into an opportunity
The forgotten human factor driving web application security flaws
More Breaches, More Problems: The Cost of Trust in Third-Party Apps
Why gamification is the key to leveling up your software security
A Brighter Future For DevSecOps? It's Closer Than You Think
A video game to improve the hiring process
How to roll out effective developer security training: 5 important lessons
Copy/Paste is a dangerous coding technique
Are your developers the first line of risk or defense? Rate your company against our Secure Coding Checklist
Take a lesson from this mindreader and make security fun again!
Shifting Left
Cybersecurity Training and Positive Reinforcement
The million dollar question every developer should be asking their prospective employers