Visit HackEDU

HackEDU Blog

Stay up to date

Secure Coding Training Application Security HackEDU Rewards

Announcing HackEDU Rewards - Automating Positive Reinforcement in Training

  We are excited to announce the launch of HackEDU Rewards, an automated rewards system that complements HackEDU’s Secure Coding Training platform. The system incentivizes developers to...

Continue Reading

Application Security Security Champion Shift Left

How Security Champions Help Improve Application Security

  Application security is a major concern for many organizations.  In 2020, over 23,000 new vulnerabilities were discovered and publicly reported in production applications.  On average,...

Continue Reading

software security Secure SDLC

What Are Bug Bounty Programs, And Why Are They Becoming So Popular?

Some organizations run bug bounty programs as a way to identify and fix vulnerabilities within their production applications.  A bug bounty program gives ethical hackers permission to test...

Continue Reading

Secure Coding Training DevSecOps Shift Left

How Secure Coding Training Fits Into The Shift Left Movement

  In the past, security was not seen as a priority during the development process.  Often, developers would only perform vulnerability scans and security audits as part of the testing...

Continue Reading

Secure Coding Training tips

Top 4 Ways To Increase Completion Rates for Secure Coding Training

  It’s indisputable: Secure Coding Training is effective in reducing vulnerabilities in code. That’s why more and more companies are turning to this training to help speed up software...

Continue Reading

Secure Coding Training guide

Announcing our Secure Coding Training Guide

  We’ve talked to hundreds of secure coding training administrators over the years, and we’ve seen many approaches to setting up and deploying a secure coding training program. We’ve seen...

Continue Reading

Secure Coding Training learning science principles

Applying Learning Science Principles to Secure Code Training

  Everyone knows the old adage: You can lead a horse to water but you can’t make it drink, and this is certainly applicable when it comes to self-directed learning through computer-based...

Continue Reading

Secure Coding Training defensive training offensive training

How Offensive Training Improves Defensive-Only Approaches in Secure Coding Training

  “I used to attack because it was the only thing I knew. Now I attack because I know it works best.” - Garry Kasparov, chess legend   Chess is an oft-used analogy for cybersecurity...

Continue Reading
Gender Diversity Considerations in Training: Avoiding Unintended Biases

When deciding which secure coding training program is right for you and your team, it’s important to choose a program that won’t unintentionally alienate certain groups. In 2021, it’s...

Continue Reading

HackEDU Secure Coding Training Application Security

What We Learned from Our Vulnerabilities Benchmark Report

We published our first “Vulnerabilities Benchmark Report” last week, a synthesis of anonymous data from tens of thousands of students on our training platform, representing hundreds of...

Continue Reading

Stay up to date