Trust Score Reveals the Value of Secure-by-Design Upskilling Initiatives
A sure way to improve your organization’s security posture is through developer upskilling in secure coding best practices, delivered in a framework that includes baselines and benchmarks designed to give developers the specific learning pathways they need. Secure coding, however, is not a one-time fix—it must become a way of life, encoded into an organization’s DNA. Developers not only have to shift left, or start left, but they need to stay left.
Simply providing training isn’t enough. Organizations need to confirm that developers have completely absorbed their training and are following best practices at the beginning of the software development lifecycle (SDLC) as part of their everyday routines. You need to track developers’ performance and measure their progress against both internal standards and industry benchmarks, effectively measuring the ROI of investing in training.
Secure Code Warrior’s Trust Score provides visibility into the performance of individual developers and aggregates the data to provide an assessment of your organization’s overall performance. It shows the effectiveness of upskilling programs while identifying areas in need of improvement. And, it helps ensure compliance with the range of regulatory compliance requirements, whether they come from the General Data Protection Regulation (GDPR), the Payment Card Industry Data Security Standard (PCI DSS), the California Consumer Privacy Act (CCPA), or others.
Our research has shown that secure code training works. Trust Score, using an algorithm drawing on more than 20 million learning data points from work by more than 250,000 learners at over 600 organizations, reveals its effectiveness in driving down vulnerabilities and how to make the initiative even more effective.
Training Improves Security – If Developers Get It
For years, using security best practices at the start of the SDLC seemed to be mostly aspirational in the software industry—great to have someday, but not a priority for today. But the ever-increasing speed of software development, along with the accelerating pace of sophisticated and destructive cyber threats—often built on targeting software vulnerabilities—have made secure coding essential. The Cybersecurity and Infrastructure Security Agency (CISA) puts secure code front and center with its Secure-by-Design initiative, which is growing into an international movement.
Our research has proved the point—the correlation between a Secure-by-Design approach and a reduction in software vulnerabilities is clear. We analyzed vulnerability reduction data from 26% of SCW’s customer base and found that developer training resulted in reductions of software vulnerabilities ranging from 22% to 84%. That range resulted from variables such as the size of the companies involved (smaller companies with relatively few developers produced a more dramatic range of results), and whether a learning group was focused on a specific problem, in which case they eliminated a higher percentage of flaws.
The results with large companies were rather consistent. Companies with 7,000 or more developers can expect to see vulnerabilities reduced by 47% to 53% as a result of developer upskilling in security. For example, one statistically average company with more than 10,000 developers—not a top performer on the platform nor one with the highest benchmark—saw a 53% reduction in vulnerabilities.
Of course, the most effective training doesn’t take a broad, one-size-fits-all approach. It should be tailored to developers’ work environments and the types of development they do.
Companies should start by establishing the baseline skills developers must have to make writing secure code as natural to them as simply writing code. Upskilling programs should consist of hands-on, agile training in real-world scenarios that match the type of work they do and the languages they use. And it should be flexible enough to fit training sessions into their work schedules.
For developers, the skill set involves more than writing code. They need to be able to check software created by artificial intelligence assistants and third parties, such as open-source repositories. Developers have made avid use of generative AI models, and they have generally lauded its benefits in helping them create more code more quickly. However, although 76% of respondents to a Snyk survey said that AI-generated code was more secure than code produced by humans, 56.4% still said that AI introduces errors sometimes or frequently. And the same survey found that 80% of developers skip applying AI code security policies, suggesting that code issues in AI code are not being addressed.
In a Secure-by-Design approach, developers—working with security teams, rather than separately from them—will address those issues early in the SDLC, identifying and remediating flaws before code goes into production.
Trust Score Measures Individual and Enterprise Performance
It’s also critical that training is ongoing. Companies need to adopt a security-first culture that applies everywhere from the highest echelons of the company on down through the ranks. It should focus on continuous improvement and the application of best security practices throughout the SDLC. Technology and cyber criminals don’t stop evolving; neither should cybersecurity. For organizations that produce software, security-trained developers are the foundation.
That’s why demonstrating that training has effectively taken hold is just as important as the training itself. Trust Score not only delivers visibility into the performance of developers individually and the organization overall, it enables organizations to drill down through performance data to focus on specific languages, developer teams or software categories. The data from individual and aggregated performance results also helps identify areas where training needs to be improved—for example, if it isn’t having the desired effect on developers’ everyday performance.
Trust Score has empowered organizations to assess developers’ performance and confirm whether they have acquired—and are using—the necessary security skills, ensuring they have earned their license to code. It allows organizations to confidently grant qualified developers access to their most sensitive data and critical software projects, while denying that access to those on the tools who aren’t quite ready yet.
Proof of a Changing Security Culture
Cybersecurity is no longer just a security issue. It’s a business issue, affecting the integrity of the most valuable asset of many organizations — their data. A serious breach affects an organization’s operations, reputation and, potentially, its viability. Cybersecurity’s importance has not been lost on regulatory bodies, which have been implementing increasingly strict regulations and shown a willingness to pursue cases against CISOs and, potentially, other members of upper management, even to the point of filing criminal charges, as in the cases of Uber and SolarWinds.
Adopting an enterprise-wide security culture is essential in today’s environment. And because so much of a company’s value rests in its data, applications and services, secure coding is a core element of that culture. Targeted training and upskilling as part of a cultural mindset, together with proof that training has helped in changing the culture can set organizations on the path to strengthening their security postures.
There is value in developer-driven security programs. The proof is in the Trust Score.
Our research has shown that secure code training works. Trust Score, using an algorithm drawing on more than 20 million learning data points from work by more than 250,000 learners at over 600 organizations, reveals its effectiveness in driving down vulnerabilities and how to make the initiative even more effective.
Matias Madou, Ph.D. is a security expert, researcher, and CTO and co-founder of Secure Code Warrior. Matias obtained his Ph.D. in Application Security from Ghent University, focusing on static analysis solutions. He later joined Fortify in the US, where he realized that it was insufficient to solely detect code problems without aiding developers in writing secure code. This inspired him to develop products that assist developers, alleviate the burden of security, and exceed customers' expectations. When he is not at his desk as part of Team Awesome, he enjoys being on stage presenting at conferences including RSA Conference, BlackHat and DefCon.
Secure Code Warrior is here for your organization to help you secure code across the entire software development lifecycle and create a culture in which cybersecurity is top of mind. Whether you’re an AppSec Manager, Developer, CISO, or anyone involved in security, we can help your organization reduce risks associated with insecure code.
Book a demoMatias Madou, Ph.D. is a security expert, researcher, and CTO and co-founder of Secure Code Warrior. Matias obtained his Ph.D. in Application Security from Ghent University, focusing on static analysis solutions. He later joined Fortify in the US, where he realized that it was insufficient to solely detect code problems without aiding developers in writing secure code. This inspired him to develop products that assist developers, alleviate the burden of security, and exceed customers' expectations. When he is not at his desk as part of Team Awesome, he enjoys being on stage presenting at conferences including RSA Conference, BlackHat and DefCon.
Matias is a researcher and developer with more than 15 years of hands-on software security experience. He has developed solutions for companies such as Fortify Software and his own company Sensei Security. Over his career, Matias has led multiple application security research projects which have led to commercial products and boasts over 10 patents under his belt. When he is away from his desk, Matias has served as an instructor for advanced application security training courses and regularly speaks at global conferences including RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec and BruCon.
Matias holds a Ph.D. in Computer Engineering from Ghent University, where he studied application security through program obfuscation to hide the inner workings of an application.
A sure way to improve your organization’s security posture is through developer upskilling in secure coding best practices, delivered in a framework that includes baselines and benchmarks designed to give developers the specific learning pathways they need. Secure coding, however, is not a one-time fix—it must become a way of life, encoded into an organization’s DNA. Developers not only have to shift left, or start left, but they need to stay left.
Simply providing training isn’t enough. Organizations need to confirm that developers have completely absorbed their training and are following best practices at the beginning of the software development lifecycle (SDLC) as part of their everyday routines. You need to track developers’ performance and measure their progress against both internal standards and industry benchmarks, effectively measuring the ROI of investing in training.
Secure Code Warrior’s Trust Score provides visibility into the performance of individual developers and aggregates the data to provide an assessment of your organization’s overall performance. It shows the effectiveness of upskilling programs while identifying areas in need of improvement. And, it helps ensure compliance with the range of regulatory compliance requirements, whether they come from the General Data Protection Regulation (GDPR), the Payment Card Industry Data Security Standard (PCI DSS), the California Consumer Privacy Act (CCPA), or others.
Our research has shown that secure code training works. Trust Score, using an algorithm drawing on more than 20 million learning data points from work by more than 250,000 learners at over 600 organizations, reveals its effectiveness in driving down vulnerabilities and how to make the initiative even more effective.
Training Improves Security – If Developers Get It
For years, using security best practices at the start of the SDLC seemed to be mostly aspirational in the software industry—great to have someday, but not a priority for today. But the ever-increasing speed of software development, along with the accelerating pace of sophisticated and destructive cyber threats—often built on targeting software vulnerabilities—have made secure coding essential. The Cybersecurity and Infrastructure Security Agency (CISA) puts secure code front and center with its Secure-by-Design initiative, which is growing into an international movement.
Our research has proved the point—the correlation between a Secure-by-Design approach and a reduction in software vulnerabilities is clear. We analyzed vulnerability reduction data from 26% of SCW’s customer base and found that developer training resulted in reductions of software vulnerabilities ranging from 22% to 84%. That range resulted from variables such as the size of the companies involved (smaller companies with relatively few developers produced a more dramatic range of results), and whether a learning group was focused on a specific problem, in which case they eliminated a higher percentage of flaws.
The results with large companies were rather consistent. Companies with 7,000 or more developers can expect to see vulnerabilities reduced by 47% to 53% as a result of developer upskilling in security. For example, one statistically average company with more than 10,000 developers—not a top performer on the platform nor one with the highest benchmark—saw a 53% reduction in vulnerabilities.
Of course, the most effective training doesn’t take a broad, one-size-fits-all approach. It should be tailored to developers’ work environments and the types of development they do.
Companies should start by establishing the baseline skills developers must have to make writing secure code as natural to them as simply writing code. Upskilling programs should consist of hands-on, agile training in real-world scenarios that match the type of work they do and the languages they use. And it should be flexible enough to fit training sessions into their work schedules.
For developers, the skill set involves more than writing code. They need to be able to check software created by artificial intelligence assistants and third parties, such as open-source repositories. Developers have made avid use of generative AI models, and they have generally lauded its benefits in helping them create more code more quickly. However, although 76% of respondents to a Snyk survey said that AI-generated code was more secure than code produced by humans, 56.4% still said that AI introduces errors sometimes or frequently. And the same survey found that 80% of developers skip applying AI code security policies, suggesting that code issues in AI code are not being addressed.
In a Secure-by-Design approach, developers—working with security teams, rather than separately from them—will address those issues early in the SDLC, identifying and remediating flaws before code goes into production.
Trust Score Measures Individual and Enterprise Performance
It’s also critical that training is ongoing. Companies need to adopt a security-first culture that applies everywhere from the highest echelons of the company on down through the ranks. It should focus on continuous improvement and the application of best security practices throughout the SDLC. Technology and cyber criminals don’t stop evolving; neither should cybersecurity. For organizations that produce software, security-trained developers are the foundation.
That’s why demonstrating that training has effectively taken hold is just as important as the training itself. Trust Score not only delivers visibility into the performance of developers individually and the organization overall, it enables organizations to drill down through performance data to focus on specific languages, developer teams or software categories. The data from individual and aggregated performance results also helps identify areas where training needs to be improved—for example, if it isn’t having the desired effect on developers’ everyday performance.
Trust Score has empowered organizations to assess developers’ performance and confirm whether they have acquired—and are using—the necessary security skills, ensuring they have earned their license to code. It allows organizations to confidently grant qualified developers access to their most sensitive data and critical software projects, while denying that access to those on the tools who aren’t quite ready yet.
Proof of a Changing Security Culture
Cybersecurity is no longer just a security issue. It’s a business issue, affecting the integrity of the most valuable asset of many organizations — their data. A serious breach affects an organization’s operations, reputation and, potentially, its viability. Cybersecurity’s importance has not been lost on regulatory bodies, which have been implementing increasingly strict regulations and shown a willingness to pursue cases against CISOs and, potentially, other members of upper management, even to the point of filing criminal charges, as in the cases of Uber and SolarWinds.
Adopting an enterprise-wide security culture is essential in today’s environment. And because so much of a company’s value rests in its data, applications and services, secure coding is a core element of that culture. Targeted training and upskilling as part of a cultural mindset, together with proof that training has helped in changing the culture can set organizations on the path to strengthening their security postures.
There is value in developer-driven security programs. The proof is in the Trust Score.
A sure way to improve your organization’s security posture is through developer upskilling in secure coding best practices, delivered in a framework that includes baselines and benchmarks designed to give developers the specific learning pathways they need. Secure coding, however, is not a one-time fix—it must become a way of life, encoded into an organization’s DNA. Developers not only have to shift left, or start left, but they need to stay left.
Simply providing training isn’t enough. Organizations need to confirm that developers have completely absorbed their training and are following best practices at the beginning of the software development lifecycle (SDLC) as part of their everyday routines. You need to track developers’ performance and measure their progress against both internal standards and industry benchmarks, effectively measuring the ROI of investing in training.
Secure Code Warrior’s Trust Score provides visibility into the performance of individual developers and aggregates the data to provide an assessment of your organization’s overall performance. It shows the effectiveness of upskilling programs while identifying areas in need of improvement. And, it helps ensure compliance with the range of regulatory compliance requirements, whether they come from the General Data Protection Regulation (GDPR), the Payment Card Industry Data Security Standard (PCI DSS), the California Consumer Privacy Act (CCPA), or others.
Our research has shown that secure code training works. Trust Score, using an algorithm drawing on more than 20 million learning data points from work by more than 250,000 learners at over 600 organizations, reveals its effectiveness in driving down vulnerabilities and how to make the initiative even more effective.
Training Improves Security – If Developers Get It
For years, using security best practices at the start of the SDLC seemed to be mostly aspirational in the software industry—great to have someday, but not a priority for today. But the ever-increasing speed of software development, along with the accelerating pace of sophisticated and destructive cyber threats—often built on targeting software vulnerabilities—have made secure coding essential. The Cybersecurity and Infrastructure Security Agency (CISA) puts secure code front and center with its Secure-by-Design initiative, which is growing into an international movement.
Our research has proved the point—the correlation between a Secure-by-Design approach and a reduction in software vulnerabilities is clear. We analyzed vulnerability reduction data from 26% of SCW’s customer base and found that developer training resulted in reductions of software vulnerabilities ranging from 22% to 84%. That range resulted from variables such as the size of the companies involved (smaller companies with relatively few developers produced a more dramatic range of results), and whether a learning group was focused on a specific problem, in which case they eliminated a higher percentage of flaws.
The results with large companies were rather consistent. Companies with 7,000 or more developers can expect to see vulnerabilities reduced by 47% to 53% as a result of developer upskilling in security. For example, one statistically average company with more than 10,000 developers—not a top performer on the platform nor one with the highest benchmark—saw a 53% reduction in vulnerabilities.
Of course, the most effective training doesn’t take a broad, one-size-fits-all approach. It should be tailored to developers’ work environments and the types of development they do.
Companies should start by establishing the baseline skills developers must have to make writing secure code as natural to them as simply writing code. Upskilling programs should consist of hands-on, agile training in real-world scenarios that match the type of work they do and the languages they use. And it should be flexible enough to fit training sessions into their work schedules.
For developers, the skill set involves more than writing code. They need to be able to check software created by artificial intelligence assistants and third parties, such as open-source repositories. Developers have made avid use of generative AI models, and they have generally lauded its benefits in helping them create more code more quickly. However, although 76% of respondents to a Snyk survey said that AI-generated code was more secure than code produced by humans, 56.4% still said that AI introduces errors sometimes or frequently. And the same survey found that 80% of developers skip applying AI code security policies, suggesting that code issues in AI code are not being addressed.
In a Secure-by-Design approach, developers—working with security teams, rather than separately from them—will address those issues early in the SDLC, identifying and remediating flaws before code goes into production.
Trust Score Measures Individual and Enterprise Performance
It’s also critical that training is ongoing. Companies need to adopt a security-first culture that applies everywhere from the highest echelons of the company on down through the ranks. It should focus on continuous improvement and the application of best security practices throughout the SDLC. Technology and cyber criminals don’t stop evolving; neither should cybersecurity. For organizations that produce software, security-trained developers are the foundation.
That’s why demonstrating that training has effectively taken hold is just as important as the training itself. Trust Score not only delivers visibility into the performance of developers individually and the organization overall, it enables organizations to drill down through performance data to focus on specific languages, developer teams or software categories. The data from individual and aggregated performance results also helps identify areas where training needs to be improved—for example, if it isn’t having the desired effect on developers’ everyday performance.
Trust Score has empowered organizations to assess developers’ performance and confirm whether they have acquired—and are using—the necessary security skills, ensuring they have earned their license to code. It allows organizations to confidently grant qualified developers access to their most sensitive data and critical software projects, while denying that access to those on the tools who aren’t quite ready yet.
Proof of a Changing Security Culture
Cybersecurity is no longer just a security issue. It’s a business issue, affecting the integrity of the most valuable asset of many organizations — their data. A serious breach affects an organization’s operations, reputation and, potentially, its viability. Cybersecurity’s importance has not been lost on regulatory bodies, which have been implementing increasingly strict regulations and shown a willingness to pursue cases against CISOs and, potentially, other members of upper management, even to the point of filing criminal charges, as in the cases of Uber and SolarWinds.
Adopting an enterprise-wide security culture is essential in today’s environment. And because so much of a company’s value rests in its data, applications and services, secure coding is a core element of that culture. Targeted training and upskilling as part of a cultural mindset, together with proof that training has helped in changing the culture can set organizations on the path to strengthening their security postures.
There is value in developer-driven security programs. The proof is in the Trust Score.
Click on the link below and download the PDF of this resource.
Secure Code Warrior is here for your organization to help you secure code across the entire software development lifecycle and create a culture in which cybersecurity is top of mind. Whether you’re an AppSec Manager, Developer, CISO, or anyone involved in security, we can help your organization reduce risks associated with insecure code.
View reportBook a demoMatias Madou, Ph.D. is a security expert, researcher, and CTO and co-founder of Secure Code Warrior. Matias obtained his Ph.D. in Application Security from Ghent University, focusing on static analysis solutions. He later joined Fortify in the US, where he realized that it was insufficient to solely detect code problems without aiding developers in writing secure code. This inspired him to develop products that assist developers, alleviate the burden of security, and exceed customers' expectations. When he is not at his desk as part of Team Awesome, he enjoys being on stage presenting at conferences including RSA Conference, BlackHat and DefCon.
Matias is a researcher and developer with more than 15 years of hands-on software security experience. He has developed solutions for companies such as Fortify Software and his own company Sensei Security. Over his career, Matias has led multiple application security research projects which have led to commercial products and boasts over 10 patents under his belt. When he is away from his desk, Matias has served as an instructor for advanced application security training courses and regularly speaks at global conferences including RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec and BruCon.
Matias holds a Ph.D. in Computer Engineering from Ghent University, where he studied application security through program obfuscation to hide the inner workings of an application.
A sure way to improve your organization’s security posture is through developer upskilling in secure coding best practices, delivered in a framework that includes baselines and benchmarks designed to give developers the specific learning pathways they need. Secure coding, however, is not a one-time fix—it must become a way of life, encoded into an organization’s DNA. Developers not only have to shift left, or start left, but they need to stay left.
Simply providing training isn’t enough. Organizations need to confirm that developers have completely absorbed their training and are following best practices at the beginning of the software development lifecycle (SDLC) as part of their everyday routines. You need to track developers’ performance and measure their progress against both internal standards and industry benchmarks, effectively measuring the ROI of investing in training.
Secure Code Warrior’s Trust Score provides visibility into the performance of individual developers and aggregates the data to provide an assessment of your organization’s overall performance. It shows the effectiveness of upskilling programs while identifying areas in need of improvement. And, it helps ensure compliance with the range of regulatory compliance requirements, whether they come from the General Data Protection Regulation (GDPR), the Payment Card Industry Data Security Standard (PCI DSS), the California Consumer Privacy Act (CCPA), or others.
Our research has shown that secure code training works. Trust Score, using an algorithm drawing on more than 20 million learning data points from work by more than 250,000 learners at over 600 organizations, reveals its effectiveness in driving down vulnerabilities and how to make the initiative even more effective.
Training Improves Security – If Developers Get It
For years, using security best practices at the start of the SDLC seemed to be mostly aspirational in the software industry—great to have someday, but not a priority for today. But the ever-increasing speed of software development, along with the accelerating pace of sophisticated and destructive cyber threats—often built on targeting software vulnerabilities—have made secure coding essential. The Cybersecurity and Infrastructure Security Agency (CISA) puts secure code front and center with its Secure-by-Design initiative, which is growing into an international movement.
Our research has proved the point—the correlation between a Secure-by-Design approach and a reduction in software vulnerabilities is clear. We analyzed vulnerability reduction data from 26% of SCW’s customer base and found that developer training resulted in reductions of software vulnerabilities ranging from 22% to 84%. That range resulted from variables such as the size of the companies involved (smaller companies with relatively few developers produced a more dramatic range of results), and whether a learning group was focused on a specific problem, in which case they eliminated a higher percentage of flaws.
The results with large companies were rather consistent. Companies with 7,000 or more developers can expect to see vulnerabilities reduced by 47% to 53% as a result of developer upskilling in security. For example, one statistically average company with more than 10,000 developers—not a top performer on the platform nor one with the highest benchmark—saw a 53% reduction in vulnerabilities.
Of course, the most effective training doesn’t take a broad, one-size-fits-all approach. It should be tailored to developers’ work environments and the types of development they do.
Companies should start by establishing the baseline skills developers must have to make writing secure code as natural to them as simply writing code. Upskilling programs should consist of hands-on, agile training in real-world scenarios that match the type of work they do and the languages they use. And it should be flexible enough to fit training sessions into their work schedules.
For developers, the skill set involves more than writing code. They need to be able to check software created by artificial intelligence assistants and third parties, such as open-source repositories. Developers have made avid use of generative AI models, and they have generally lauded its benefits in helping them create more code more quickly. However, although 76% of respondents to a Snyk survey said that AI-generated code was more secure than code produced by humans, 56.4% still said that AI introduces errors sometimes or frequently. And the same survey found that 80% of developers skip applying AI code security policies, suggesting that code issues in AI code are not being addressed.
In a Secure-by-Design approach, developers—working with security teams, rather than separately from them—will address those issues early in the SDLC, identifying and remediating flaws before code goes into production.
Trust Score Measures Individual and Enterprise Performance
It’s also critical that training is ongoing. Companies need to adopt a security-first culture that applies everywhere from the highest echelons of the company on down through the ranks. It should focus on continuous improvement and the application of best security practices throughout the SDLC. Technology and cyber criminals don’t stop evolving; neither should cybersecurity. For organizations that produce software, security-trained developers are the foundation.
That’s why demonstrating that training has effectively taken hold is just as important as the training itself. Trust Score not only delivers visibility into the performance of developers individually and the organization overall, it enables organizations to drill down through performance data to focus on specific languages, developer teams or software categories. The data from individual and aggregated performance results also helps identify areas where training needs to be improved—for example, if it isn’t having the desired effect on developers’ everyday performance.
Trust Score has empowered organizations to assess developers’ performance and confirm whether they have acquired—and are using—the necessary security skills, ensuring they have earned their license to code. It allows organizations to confidently grant qualified developers access to their most sensitive data and critical software projects, while denying that access to those on the tools who aren’t quite ready yet.
Proof of a Changing Security Culture
Cybersecurity is no longer just a security issue. It’s a business issue, affecting the integrity of the most valuable asset of many organizations — their data. A serious breach affects an organization’s operations, reputation and, potentially, its viability. Cybersecurity’s importance has not been lost on regulatory bodies, which have been implementing increasingly strict regulations and shown a willingness to pursue cases against CISOs and, potentially, other members of upper management, even to the point of filing criminal charges, as in the cases of Uber and SolarWinds.
Adopting an enterprise-wide security culture is essential in today’s environment. And because so much of a company’s value rests in its data, applications and services, secure coding is a core element of that culture. Targeted training and upskilling as part of a cultural mindset, together with proof that training has helped in changing the culture can set organizations on the path to strengthening their security postures.
There is value in developer-driven security programs. The proof is in the Trust Score.
Table of contents
Matias Madou, Ph.D. is a security expert, researcher, and CTO and co-founder of Secure Code Warrior. Matias obtained his Ph.D. in Application Security from Ghent University, focusing on static analysis solutions. He later joined Fortify in the US, where he realized that it was insufficient to solely detect code problems without aiding developers in writing secure code. This inspired him to develop products that assist developers, alleviate the burden of security, and exceed customers' expectations. When he is not at his desk as part of Team Awesome, he enjoys being on stage presenting at conferences including RSA Conference, BlackHat and DefCon.
Secure Code Warrior is here for your organization to help you secure code across the entire software development lifecycle and create a culture in which cybersecurity is top of mind. Whether you’re an AppSec Manager, Developer, CISO, or anyone involved in security, we can help your organization reduce risks associated with insecure code.
Book a demoDownloadResources to get you started
Benchmarking Security Skills: Streamlining Secure-by-Design in the Enterprise
The Secure-by-Design movement is the future of secure software development. Learn about the key elements companies need to keep in mind when they think about a Secure-by-Design initiative.
DigitalOcean Decreases Security Debt with Secure Code Warrior
DigitalOcean's use of Secure Code Warrior training has significantly reduced security debt, allowing teams to focus more on innovation and productivity. The improved security has strengthened their product quality and competitive edge. Looking ahead, the SCW Trust Score will help them further enhance security practices and continue driving innovation.
Resources to get you started
Reactive Versus Preventive Security: Prevention Is a Better Cure
The idea of bringing preventive security to legacy code and systems at the same time as newer applications can seem daunting, but a Secure-by-Design approach, enforced by upskilling developers, can apply security best practices to those systems. It’s the best chance many organizations have of improving their security postures.
The Benefits of Benchmarking Security Skills for Developers
The growing focus on secure code and Secure-by-Design principles requires developers to be trained in cybersecurity from the start of the SDLC, with tools like Secure Code Warrior’s Trust Score helping measure and improve their progress.
Driving Meaningful Success for Enterprise Secure-by-Design Initiatives
Our latest research paper, Benchmarking Security Skills: Streamlining Secure-by-Design in the Enterprise is the result of deep analysis of real Secure-by-Design initiatives at the enterprise level, and deriving best practice approaches based on data-driven findings.
Deep Dive: Navigating the Critical CUPS Vulnerability in GNU-Linux Systems
Discover the latest security challenges facing Linux users as we explore recent high-severity vulnerabilities in the Common UNIX Printing System (CUPS). Learn how these issues may lead to potential Remote Code Execution (RCE) and what you can do to protect your systems.