Visit HackEDU

HackEDU Blog

Stay up to date

HackEDU Announcement

We Made Some Major Improvements To Our Training

  We constantly strive to improve our secure coding training platform, and as part of that effort, we pay close attention to the feedback that everyone who uses our product provides us....

Continue Reading

software security Secure SDLC

What is the S-SDLC or Secure SDLC?

  There was a point in time when the only thing that mattered when it came to software development was that functional software was deployed in the stipulated time. There wasn't much...

Continue Reading

DevSecOps threat modeling

What is Threat Modeling? (practical guide + threat modeling template)

  Note: You can use our free Threat Modeling template to make it easier to follow along. Simply make a copy or download the template, which is located on Google Drive. Introduction Threat...

Continue Reading

Application Security offensive training definitions

Finding Vulnerabilities:  Differences among Vulnerability Scanning, Pen Testing, Bug Bounty, Red Team and Purple Team Compared

  When designing systems to be impervious to outside activity, you should always aim to be at least two steps ahead of your adversaries. Whatever it is that you want to protect, whether...

Continue Reading

DevSecOps definitions Introduction

What Are Git Hooks?

Hooks are scripts that run at different steps during the commit process. They are completely customizable and will trigger events at key points during the development life cycle. Some...

Continue Reading

offensive training ctf

What is a Capture The Flag Event, and How Does It Benefit Developers?

What is a CTF? A Capture the Flag event, or CTF for short, is a gamified exercise designed to test cybersecurity skills. The goal of the game, much like in the live-action, outdoor game...

Continue Reading

Secure Coding Training Application Security HackEDU Rewards

Announcing HackEDU Rewards - Automating Positive Reinforcement in Training

  We are excited to announce the launch of HackEDU Rewards, an automated rewards system that complements HackEDU’s Secure Coding Training platform. The system incentivizes developers to...

Continue Reading

Application Security Security Champion Shift Left

How Security Champions Help Improve Application Security

  Application security is a major concern for many organizations.  In 2020, over 23,000 new vulnerabilities were discovered and publicly reported in production applications.  On average,...

Continue Reading

software security Secure SDLC

What Are Bug Bounty Programs, And Why Are They Becoming So Popular?

Some organizations run bug bounty programs as a way to identify and fix vulnerabilities within their production applications.  A bug bounty program gives ethical hackers permission to test...

Continue Reading

Secure Coding Training DevSecOps Shift Left

How Secure Coding Training Fits Into The Shift Left Movement

  In the past, security was not seen as a priority during the development process.  Often, developers would only perform vulnerability scans and security audits as part of the testing...

Continue Reading

Stay up to date