Visit HackEDU

HackEDU Blog

Stay up to date

DevSecOps Secure SDLC Shift Left

How do you Train Developers in Secure SDLC Practices?

  As the threat environment grows more serious, applications have become a more vulnerable part of the overall attack surface. To mitigate application-level risk exposure, it is necessary...

Continue Reading
OWASP Top 10 2021 List - What’s New and What Should You Do to Respond?

  As you may already know, the OWASP Top 10 is an awareness document that helps developers learn about common software security issues and the corresponding remediations. Many compliance...

Continue Reading
Beyond the OWASP Top 10 for Companies Subject to PCI Compliance

  A common question we receive from our customers is “How else can we improve our secure coding knowledge once our developers have completed the OWASP Top 10?”. This is particularly...

Continue Reading

software security Secure SDLC

How do you Practice Secure Coding?

  Developers are the foundation of an organization’s digital strategy, building the products and services that drive revenue and help their company to operate more efficiently....

Continue Reading

HackEDU Announcement

We Made Some Major Improvements To Our Training

  We constantly strive to improve our secure coding training platform, and as part of that effort, we pay close attention to the feedback that everyone who uses our product provides us....

Continue Reading

software security Secure SDLC

What is the S-SDLC or Secure SDLC?

  There was a point in time when the only thing that mattered when it came to software development was that functional software was deployed in the stipulated time. There wasn't much...

Continue Reading

DevSecOps threat modeling

What is Threat Modeling? (practical guide + threat modeling template)

  Note: You can use our free Threat Modeling template to make it easier to follow along. Simply make a copy or download the template, which is located on Google Drive. Introduction Threat...

Continue Reading

Application Security offensive training definitions

Finding Vulnerabilities:  Differences among Vulnerability Scanning, Pen Testing, Bug Bounty, Red Team and Purple Team Compared

  When designing systems to be impervious to outside activity, you should always aim to be at least two steps ahead of your adversaries. Whatever it is that you want to protect, whether...

Continue Reading

DevSecOps definitions Introduction

What Are Git Hooks?

Hooks are scripts that run at different steps during the commit process. They are completely customizable and will trigger events at key points during the development life cycle. Some...

Continue Reading

offensive training ctf

What is a Capture The Flag Event, and How Does It Benefit Developers?

What is a CTF? A Capture the Flag event, or CTF for short, is a gamified exercise designed to test cybersecurity skills. The goal of the game, much like in the live-action, outdoor game...

Continue Reading

Stay up to date