SecurityJourney Profile Banner
Security Journey Profile
Security Journey

@SecurityJourney

Followers
1K
Following
397
Media
2K
Statuses
4K

AppSec education for developers and everyone in the SDLC

Raleigh, NC
Joined September 2014
Don't wanna be here? Send us removal request.
@SecurityJourney
Security Journey
1 month
๐Ÿ“” Security Champions don't need another dry academic manual. That's why the Security Champions Field Guide is packed with resources to help developers tackle security challenges with confidence. ๐Ÿ’ช. ๐Ÿ‘‰ Download the guide:
Tweet media one
0
0
0
@SecurityJourney
Security Journey
1 day
Developers are coding faster with AI, but often without the training or governance to keep that code secure. ๐Ÿ”Ž What can organizations do to catch up? ๐Ÿ‘‰ Read the full article to learn more: #ai #cybersecurity #appsec #securecode #aisecurity.
0
1
1
@SecurityJourney
Security Journey
1 day
"AI is trying to go up like a plane. the reality is, it's starting to come back down." โœˆ๏ธ. Our new report + roundtable breaks down how AI is outpacing security, and what dev teams need to catch up. ๐Ÿ“ฅ Download the report + ๐ŸŽฅ Watch the full convo: #ai
0
1
1
@SecurityJourney
Security Journey
2 days
Developers are coding faster with AI, but often without the training or governance to keep that code secure. The result? ๐Ÿ“Š A growing security gap thatโ€™s leaving organizations exposed. ๐Ÿ”Ž What can organizations do to catch up? ๐Ÿ‘‰ Read the full article:
0
1
1
@SecurityJourney
Security Journey
3 days
๐Ÿค–๐Ÿ”’ AI is changing how we write code. but security isn't keeping up. The result? ๐Ÿ“ˆ A growing security gap most teams aren't prepared for. We brought together experts from Dev, Appsec, and AI for a conversation about what's changing. ๐ŸŽฅ Watch Now:
Tweet media one
0
1
1
@SecurityJourney
Security Journey
3 days
What does it take to transform security at scale? ๐Ÿ“Š In this episode of The Security Champions Podcast, @JacobSalassi shares insight on the role of empathy in security engagement, building effective programs, and the impact of LLMs. ๐ŸŽฅ Watch Now: #podcast
Tweet media one
0
0
1
@SecurityJourney
Security Journey
4 days
๐Ÿค– AI TIP TUESDAYS ๐Ÿค–. AI Coding Tip 1 of 5: Start with the basics! ๐Ÿ“Š. Before diving into AI-powered code, take time to understand how AI works. Familiarize yourself with algorithms, models, and fundamental concepts to set a strong foundation. ๐Ÿ‘‰ Stay tuned for Tip 2!
Tweet media one
0
0
1
@SecurityJourney
Security Journey
4 days
Compliance won't stop an attack; secure development will. ๐Ÿ’ป๐Ÿ”’. This webinar with @SCMagazine covers:.๐Ÿค– GenAI, PCI DSS v4.0, and new regulations.๐Ÿ’ช Developer-first training.๐Ÿ”’ Practical steps for building a security culture. Watch now: #securecode #appsec.
0
0
0
@SecurityJourney
Security Journey
5 days
What is a virtual machine, and how do you use one? ๐Ÿค”. It can be a game changer in secure code training. ๐ŸŽฎ Learn how we use VMs to create real coding environments for hands-on learning in our recent blog post. ๐Ÿ’ปโœจ. ๐Ÿ“– Read more: #vm #securecode #appsec
Tweet media one
0
0
0
@SecurityJourney
Security Journey
8 days
๐ŸŽ™๏ธ NEW EPISODE ALERT. Curious about leading security transformation at scale? ๐Ÿ“ˆ @JacobSalassi joined this episode of The Security Champions Podcast to share insights from his experience in building and scaling appsec programs. ๐ŸŽง Tune in now: #podcast
Tweet media one
0
0
0
@SecurityJourney
Security Journey
9 days
When you find hardcoded API keys. again. ๐Ÿ‘€
Tweet media one
0
0
1
@SecurityJourney
Security Journey
10 days
Ever wonder how hands-on secure code lessons actually run real code? ๐Ÿ’ป. It all comes down to one thing. virtual machines. In our latest blog post, we explain what a VM is and how we use it to deliver a high-fidelity learning experience. ๐Ÿ“– Read more:
0
0
0
@SecurityJourney
Security Journey
11 days
๐Ÿ’ป CWE-20: Improper Input Validation might sound simple. but it's behind some of the most dangerous vulns in modern software. Like baking with powdered sugar instead of flour. ๐ŸŽ‚๐Ÿณ.If you don't validate inputs, you're creating a recipe for disaster.
Tweet media one
0
0
0
@SecurityJourney
Security Journey
12 days
Not all security initiatives are created equal. ๐Ÿง . Start with low-effort, high-impact wins, then work your way up. ๐ŸŽ™๏ธ Hear the full breakdown in this episode of The Security Champions Podcast: #appsec #securitychampions #devsecops
Tweet media one
0
0
0
@SecurityJourney
Security Journey
15 days
๐Ÿ’ฅ Don't just react to threats, stay ahead of them. The OWASP Top 10 Proactive Controls are your blueprint for dev-first appsec. โžก๏ธ Learn what they are, why they matter, and how to use them in your SDLC. ๐Ÿ“– Read more: #OWASP #appsec #securecode.
0
0
0
@SecurityJourney
Security Journey
16 days
Improper Neutralization of Special Elements in a Command (CWE-77) lets input hijack how commands run. This can allow attackers to execute code or even cause a total compromise. ๐Ÿ›‘. ๐Ÿ’ก Tip: Always sanitize input before constructing commands. #CWE #appsec #securecode
Tweet media one
0
0
0
@SecurityJourney
Security Journey
17 days
Secure code unlocked. ๐Ÿ”“
Tweet media one
0
0
0
@SecurityJourney
Security Journey
18 days
AI is fueling smarter cyberattacks, and devs are the first line of defense. โš”๏ธ. Our webinar, Code or Be Conquered, covers:.โœ… How AI + new regulation shape code.โœ… What makes dev-first training work.โœ… How to resist ransomware + scale security. Watch now:
0
0
0
@SecurityJourney
Security Journey
19 days
"Innovation. only succeeds when people trust that the systems behind it are built with quality and security in mind from the start." - Dustin Lehr, AppSec Advocate. Read the full @SecurityWeek article: #appsec #securecode #cybersecurity.
0
0
0
@SecurityJourney
Security Journey
19 days
RT @OWASPSB: Join us online next Thu, Jul 10 for a Secure Coding Workshop & CTF, brought to you by @OWASPSB and @SecurityJourney!. A greatโ€ฆ.
0
4
0
@SecurityJourney
Security Journey
22 days
Want to build a stronger security culture? ๐Ÿ’ช. Start with Tactical AppSec: A Security Championsโ€™ Field Guide ๐Ÿ“—.โœ… OWASP & CWE threats.โœ… Real-world threat modeling.โœ… Secure code reviews.โœ… Tools that work (SAST, DAST & more). ๐Ÿ“ฉ Get the guide:
0
0
0