Inside, you will find an overview of our core design elements and basic rules around how these elements can be applied to various communications. These are the key building blocks of our brand expression.
Secure Code Warrior inspires developers to secure the software that runs our world through a developer-driven secure code learning platform.
Our brand is more than a logo, color or font. It’s how we talk, how we deliver on our promises and ultimately how our customers and the market perceive us.
The primary elements of Secure Code Warrior’s visual identity are shown here: logo, color palette, typography, and illustration and iconography styles. When used consistently according to these guidelines, these elements form a flexible system for creating stories and experiences that amplify the Secure Code Warrior brand.
The Brand Platform is the foundation of our Brand Strategy, and it comprises the Brand Idea, the Emotional Impact, a Positioning Statement, Positioning Pillars, and an Audience definition.
The Brand Idea is the essence or embodiment of what we stand for. It gives an emotional dimension to the brand. It is used to guide look, feel, and voice.
Emotional Impact is defined by how the Secure Code Warrior brand makes people feel. It is a set of four positive emotions that drives the behavior of the brand across all experiences and touchpoints.Brand Positioning is the singular, differentiated and relevant idea we want to stand for in the minds of our customers.
Positioning Pillars are the evergreen, authentic truths about Secure Code Warrior. All our communications should accurately reflect one or more of our Positioning Pillars to ensure a cohesive story across all experiences and touchpoints.
Our audience is unified by an overarching psycho graphic profile, and all brand expressions should resonate with this target.
Pairing a solid shield symbol with a bespoke logotype, the Secure Code Warrior logo is a principal component of our brand system. The following pages include detailed guidance on the logo’s application and usage.
Our logo is available in three configurations to giveyou optimal flexibility.
The balanced logotype and compact shape of this configuration suit most applications. Use it whenever possible.
Use this vertical, centered configuration when horizontal space is limited on items such as swag.
You can use this horizontal configuration when vertical space is limited, e.g. on website mastheads.
The Secure Code Warrior Brand Identity must appear clearly and legibly in all applications.
Minimum clear space prevents elements such as type, images, or other logos from entering the exclusion zone and compromising the readability and impact of our logo.
For all logo configurations, the minimum clear space around the logo is half the width of the shield. Whenever possible, use more clear space to allow the logo room to breathe.
The minimum size is the smallest our logo can appear without compromising legibility. Shown here are the recommended minimum sizes you should use for both digital and print applications.
If you have an application that requires an even smaller size, please discuss your needs with our brand team.
The examples shown to the right illustrate uses you should avoid. The Secure Code Warrior logo is custom drawn. Never modify or recreate it or its elements. Always use the logo artwork as provided.
Although our full logo is the primary expression of our brand and should be used whenever possible, our symbol may be used on its own in certain applications
You can adapt our symbol for use as a social media icon or favicon. The Gold symbol variation (see page 17) is preferred for this application. In light mode, Midnight is the preferred background color. (Please see pages 20–24 for guidance on our brand colors.)
When using our symbol on apparel or swag, make sure it is accompanied by our full logo on a different side of the item, as shown here. On very small swag items, such as pins, you can use our symbol without our full logo.
You can use our symbol as a small graphic element in the header or footer (interior pages only) of a document, as shown here. For examples of our symbol in use, please see the Brand Applications section.
Clear space is the area surrounding our symbol that must be kept free of any visual elements—text, graphics, borders, patterns, other logos, etc. Shown here are specifications for the minimum clear space you should use for our symbol.
The minimum size is the smallest our symbol can appear without compromising legibility. Shown here are the recommended minimum sizes you should use for both digital and print applications. If you have an application that requires an even smaller size, please discuss your needs with our brand team.
Note: The minimum size exhibit on this page is shown at 200% scale for clearer Illustration.
Our symbol is available in the three color variations shown here: Gold, Midnight, and White.
You can use this special-use variation for b&w print applications, such as newspaper ads, or co-branding situations where our symbol has to appear on a color outside of our palette. Avoid using this variation onscreen or in full-color print applications.
The approved symbol/background color pairings shown to the right have been chosen to be legible and on-brand. These are the only pairings you should use. For information on our color palette, please see pages 20–24.
The Secure Code Warrior color palette has been refreshed to elevate a series of blues as the primary color approach. Gold is still a primary brand color, but it should used minimally in our logo and as a highlight color. A bright secondary palette has been crafted for additional accents and data visualization.
Shown to the right are specifications for reproducing our color palette in both digital and print applications. Secure Code Warrior colors are based on current RGB standards and the Pantone Matching System. These colors have been carefully chosen to represent our brand and should never be altered.
Midnight is softer than regular black and contains a hint of blue. Never use black in digital applications— always use Midnight Blue. In print applications where Pantone spot colors are not available, use regular black for smaller typography to avoid registration issues on press.
Note: The Pantone and CMYK colors specified here are for use on coated paper stocks. If an application requires printing on uncoated stock, please work with our brand team and your printer to determine optimum color matches.
Our colors have been tested against Web Content Accessibility Guidelines (WCAG) for optimal legibility across a variety of backgrounds. Shown here are the recommended typographic and background color combinations that pass WCAG 2.0 AAA and AA international standards.
The “AA Large” designation on this page denotes usage that is reserved for large text only. Large text is defined by WCAG standards as 14 point (typically 18.66px) and bold or larger, or 18 point (typically 24px) or larger.
Note: Within our color palette, there are additional color combinations that pass accessibility standards. However, they are not part of our visual system, and you should avoid their use.
The examples shown here illustrate color usages you should avoid.
The Secure Code Warrior typographic system is built upon two fonts: Red Hat and Clash Display.
Red Hat, developed by MCKL for Red Hat, Inc., features a modern, geometric sans-serif design with clean lines and a versatile aesthetic, making it suitable for both digital and print media. Its straightforward, professional appearance ensures readability across different platforms. Red Hat Mono, a monospaced variant, completes the typographic system by providing a distinctive option for code and technical content.
Clash Display is a bold and expressive typeface that stands out with its high contrast and unique character shapes. It adds a touch of sophistication and flair wherever it’s used.
Together, these fonts create a balanced and cohesive design language that is both functional and visually appealing.
Clash Display and Red Hat are our primary brand fonts. You should use them in all external-facing marketing materials.
Both Clash Display and Red Hat are available as free downloads at Google Fonts.
Note: Only the font weights shown on this page are used in the Secure Code Warrior visual system. Avoid using any other weights.
Follow the specifications outlined here when creating layouts.
In general, align typography flush left. You can use different justification when industry standards dictate formatting, such as for press releases. Use metric kerning and default letter spacing throughout. Headlines that are complete sentences should use punctuation. Use Italics only to denote titles and names of works; avoid using it for emphasis within body text.
For examples of our typographic system in use, please see the Brand Applications section.
It may not be possible to use our brand fonts when collaborating with other organizations on shared documents. In these instances, you can use Arial as a substitute.
Arial is a standard system typeface that is pre- installed on most computers.
Arial may also be used in other situations where it is not possible to use Red Hat, such as email signatures, some EDM platforms and other channels where only system fonts are permitted.
Development teams learn while they code to prevent security vulnerabilities before they happen with our all-in-one secure coding training platform.
Learn more about our Learning PlatformFounded in Australia by Pieter Danhieux, Fatemah Beydoun, Colin Wong, and Jaap Karan Singh.
After securing four major Australian banks as clients, the company embarked on a global expansion into the US and EU. This included the acquisition of the Belgian company Sensei, and appointment of its creators, Matias Madou and Nathan Desmet, to Secure Code Warrior’s founding team.
Today, the company serves over 650 global enterprise customers and employs more than 200 people worldwide. It has been honored with over a dozen awards - including the 2020 SINET 16 Innovator Award and JPMorgan Chase & Co’s 2021 Hall of Innovation - and has achieved SOC 2 Type II certification.
Our dedicated Legal team helps our business meet the needs of our customers by providing strategic advice on an increasingly complex, global and ever-changing regulatory landscape.
Chief Executive Officer, Chairman, and Co-Founder
Chief Technology Officer, Director, and Co-Founder
Chief Customer Officer, and Co-Founder
Director of Product Innovation. Chief Dragon Slayer and Co-Founder
Director of Customer Strategy. Chief Singh and Co-founder.
Principal Engineer, and Co-Founder