This site did not show evidence of storing passwords in plaintext.
This site does allow secured connections (https)
This site did show a clear way to unsubscribe from their emails
This site does verify your email address.
Membership Emails
Below is a sample of the emails you can expect to receive when signed up to Secure Code Warrior.
Welcome to Secure Code Warrior, it''s great to meet you!
To view this email as a web page, click here
Your battle plan for banishing 10 top coding bugs
The 10 most common coding vulnerabilities, such as SQL injection and cross-site scripting, have been around for decades -- even though we know how to solve them.
Learn how to banish each of these bugs from your code and become a secure coding superhero.
Privacy Policy.Terms and Conditions.Preference Center. Unsubscribe. Contact Us.
Unsubscribe
.emailview
Welcome to Secure Code Warrior, it''s great to meet you!
To view this email as a web page, click here
Get a better return on your AppSec budget
Prevention is better than cure, right? So empowering developers to write secure code in the first place beats spending days finding problems and then battling to have them fixed.
Try a new approach to code security -- and make AppSec the hero at your organization. Here''s what our Co-Founder, Matias Madou has to say:
Privacy Policy.Terms and Conditions.Preference Center. Unsubscribe. Contact Us.
Unsubscribe
.emailview
Welcome to Secure Code Warrior, it''s great to meet you!
To view this email as a web page, click here
DevOps: It's not magic; it's engineering
Dev and ops teams often work in silos, but an integrated approach can empower your organization to deliver safe, secure software at the speed of innovation.
A collaborative DevOps culture that involves checking in smaller amounts of production-quality code to be scanned in real time by automated security tests will help you deliver faster, more secure releases.
Privacy Policy.Terms and Conditions.Preference Center. Unsubscribe. Contact Us.
Unsubscribe
To view this email as a web page, click here
Would you tell someone that their baby was ugly?
In the past, software security was the job of a very particular bunch of geeks who had little interaction with developers writing the code. It was AppSec's role to point out flaws in the code, and tell the developer who slaved over it that their baby was ugly.
Fast-forward to today and the situation is much the same, but with higher stakes as the world becomes more reliant on software.
The question becomes, who should shoulder the responsibility for security, and who is teaching who how to solve the problem of security compliance?
Privacy Policy.Terms and Conditions.Preference Center. Unsubscribe. Contact Us.
To view this email as a web page, click here
Combating PCI with the OWASP Top 10
Being able to find and fix the OWASP Top 10 before code is shipped is just one of the examples 'The PCI-DSS Guide for Developers' has been identified as a way for you to benchmark your internal skills.
So, where do you start? Here's our guide to navigating through the OWASP battlefield.
Privacy Policy.Terms and Conditions.Preference Center. Unsubscribe. Contact Us.
To view this email as a web page, click here
If compliance was a color, it would be beige
The word "compliance" isn't very exciting. It's formal, dry, directive.even a little restrictive in its tone. If it had a color, it would be beige.
The thing is, as much as we try to avoid it, compliance is a must-have. Here's a guide on how AppSec specialists like yourself can work closely with development managers to empower developers, strengthen the SDLC and get specific outcomes from general legislation.
Privacy Policy.Terms and Conditions.Preference Center. Unsubscribe. Contact Us.
To view this email as a web page, click here
Does training get a bad rap?
Creating secure software in an environment with a poor security culture is like trying to win a marathon with a boulder chained to your ankle: virtually impossible, and unnecessarily difficult.
Security training and culture can go hand-in-hand, it's all about your execution. Find out how injecting the right type of security training can have a positive effect on culture.
Privacy Policy.Terms and Conditions.Preference Center. Unsubscribe. Contact Us.
To view this email as a web page, click here
Shifting Left Vs Starting Left
When was the last time you got really excited about learning something new? Our bet is, if it was surrounded by words like "mandatory" or "compliance" and involved staring at a generic video, your excitement didn't last long.
It's the same when developers need to learn about secure coding. The more engaging and relevant the content, the more excited they are to get involved. Learn why starting left is better than shifting left when it comes to software security excellence.
Privacy Policy.Terms and Conditions.Preference Center. Unsubscribe. Contact Us.
.emailview
Welcome to Secure Code Warrior, it''s great to meet you!
To view this email as a web page, click here
Welcome to Secure Code Warrior,
it''s great to meet you!
It feels like the problem of "cybersecurity compliance" has been trending for years. Companies are hitting the panic button and rushing into training initiatives to protect themselves as best they can.
Many of these may meet a need, and (dare we say it) tick-a-box, but are frankly a bit boring, with content that's generic or outdated.
So what's the solution?
Find out how a dynamic approach to training can kick-start your journey to more secure code.
Privacy Policy.Terms and Conditions.Preference Center. Unsubscribe. Contact Us.
To view this email as a web page, click here
Regulating security training for developers
The language around compliance training is often deliberately vague. This is the case in the USA with the recently introduced guidelines from the National Institute of Technology (NIST). It states developers must undertake some kind of security training, but haven't specified what that looks like.
That's good and bad news for organizations. You could create a compliance-led training video and tick a box, or invest time in customized training that suits your specific security needs.
Privacy Policy.Terms and Conditions.Preference Center. Unsubscribe. Contact Us.
To view this email as a web page, click here
Free Security Health Check
Every organization on the planet is fighting to retain and gain market share, with customers who expect a seamless online experience and digital-first approach to business that needs to be more secure than ever before.
With you and your team, creative CISOs and CIOs are in a prime position to continue forging the path of our digital future.
Take a look at our Health Check to see what you can do to get ahead of the game.