SafeStack Blog
Keep up to date with the latest news and trends in secure development, security culture with our articles, templates and resources
Featured Articles
Sprint #3: Embracing laziness
Discover how to streamline application security tasks and automate repetitive processes in the latest episode of SafeStack OneHourAppSec. Join us as we explore ways to make appsec easier.
Changing the software development industry, one student at a time
SafeStack: Building a Secure Future for Software Developers in NZ & AU. Learn about our sponsorship program enabling students to learn secure development early in their career.
Sprint #2: How bad can it be
Discover how to handle software security issues and assess their severity in our latest episode of Safestack OneHourAppSec. Don't panic, it's just math!
Sprint #1: Start where you are
Join us for the first episode of OneHourAppSec as we dive into application security. Learn how to identify your software and manage security debt effectively. Let's secure your apps together!
How to stay safe when inheriting third-party code
Discover how to select secure code libraries and maintain them effectively with this practical guide. Learn how to safeguard your software from 3rd party vulnerabilities today.
What is SBOM and why should we care?
Discover the significance of SBOM (software bill of materials) in software development on our new Safestack blog. Uncover the origins of SBOM and how it influences your work.
How to build software products that are “Secure by Default”
Explore the concept of "Secure by Default" in our new Safestack blog post. Learn how this global movement is shaping software security for your team and projects.
What Secure by Design means for software development teams
Unveil the secrets of Secure by Design on the new safestack blog. Learn how this mindset shift affects software developers and team leads. Dive into the world of secure software development today!
What are the “Secure by Design” and “Secure by Default” approaches to software security?
Discover the new safestack blog, where we explore the shift towards Secure by Design and Secure by Default approaches in tech manufacturing. Break the cycle of post-release fixes and ensure security from the start.
How to improve software security outcomes by teaching good engineers to be bad people
Discover the power of curiosity and playfulness in software engineering on the Safestack blog. Embrace your inner child to create more secure software.
How to introduce a new security rituals into an existing software development lifecycle
Enhance the security of your software with new rituals, processes, and tools that can be seamlessly integrated into your software development lifecycle (SDLC). Explore more in this detailed guide.
How ChatGPT impacts cyber security and how to get your team safely started with it
Discover the impact of ChatGPT on cyber security and find out how to securely introduce it to your team. Start now!
How to use Behavior-Driven Development (BDD) to design software with villains in mind
Discover the importance of considering evil villains in software design to strengthen your cyber security defenses and safeguard your data.
The role of product management in cyber security
Discover the crucial role of product management in cyber security and how it can be your organization's secret weapon when it comes to building secure software. Learn more in this article.
How to measure the maturity of your software product
Explore the concept of product security maturity and learn how to measure it effectively. Discover the key approaches and tools to enhance your product's security posture.
How to measure the maturity of your software development lifecycle
Discover the importance of lifecycle security maturity and product security maturity in application security. This article provides guidance on measuring and enhancing your security, along with valuable open-source resources.
Take control of your cyber security training with SafeStack Learning Paths
Discover SafeStack's new Learning Paths feature for tailored team training. Group leaders can assign courses to the entire organization or specific groups.
Effective strategies to prevent burnout in application security
Discover effective strategies to prevent burnout and overwhelm in application security with our new article. Stay ahead of the game!
Using leading indicators to measure software security maturity
Discover how leading indicators can help forecast software security maturity in our latest article.
Should software security be part of quality?
Explore the importance of integrating software security into quality practices such as the “ilities” and why this matters for keeping our systems and data secure.