Visit HackEDU

HackEDU Blog

Stay up to date

DevSecOps definitions Introduction

What Are Git Hooks?

Hooks are scripts that run at different steps during the commit process. They are completely customizable and will trigger events at key points during the development life cycle. Some...

Continue Reading

offensive training ctf

What is a Capture The Flag Event, and How Does It Benefit Developers?

What is a CTF? A Capture the Flag event, or CTF for short, is a gamified exercise designed to test cybersecurity skills. The goal of the game, much like in the live-action, outdoor game...

Continue Reading

Secure Coding Training Application Security HackEDU Rewards

Announcing HackEDU Rewards - Automating Positive Reinforcement in Training

  We are excited to announce the launch of HackEDU Rewards, an automated rewards system that complements HackEDU’s Secure Coding Training platform. The system incentivizes developers to...

Continue Reading

Application Security Security Champion Shift Left

How Security Champions Help Improve Application Security

  Application security is a major concern for many organizations.  In 2020, over 23,000 new vulnerabilities were discovered and publicly reported in production applications.  On average, a...

Continue Reading

software security Secure SDLC

What Are Bug Bounty Programs, And Why Are They Becoming So Popular?

Some organizations run bug bounty programs as a way to identify and fix vulnerabilities within their production applications.  A bug bounty program gives ethical hackers permission to test...

Continue Reading

Secure Coding Training DevSecOps Shift Left

How Secure Coding Training Fits Into The Shift Left Movement

  In the past, security was not seen as a priority during the development process.  Often, developers would only perform vulnerability scans and security audits as part of the testing...

Continue Reading

Secure Coding Training tips

Top 4 Ways To Increase Completion Rates for Secure Coding Training

  It’s indisputable: Secure Coding Training is effective in reducing vulnerabilities in code. That’s why more and more companies are turning to this training to help speed up software...

Continue Reading

Secure Coding Training guide

Announcing our Secure Coding Training Guide

  We’ve talked to hundreds of secure coding training administrators over the years, and we’ve seen many approaches to setting up and deploying a secure coding training program. We’ve seen...

Continue Reading

Secure Coding Training learning science principles

Applying Learning Science Principles to Secure Code Training

  Everyone knows the old adage: You can lead a horse to water but you can’t make it drink, and this is certainly applicable when it comes to self-directed learning through computer-based...

Continue Reading

Secure Coding Training defensive training offensive training

How Offensive Training Improves Defensive-Only Approaches in Secure Coding Training

  “I used to attack because it was the only thing I knew. Now I attack because I know it works best.” - Garry Kasparov, chess legend   Chess is an oft-used analogy for cybersecurity...

Continue Reading

Stay up to date