SafeStack Blog
Keep up to date with the latest news and trends in secure development, security culture with our articles, templates and resources
Featured Articles
Sprint #7: Getting on with an SBOM
Discover the importance of SBOM in software development with SafeStack OneHourAppSec program. Build a secure artifact and learn how to integrate technologies effectively. Stay ahead of regulations!
Integrating Security into UX Design
Learn how cyber security impacts UX design and uncover effective strategies to enhance the security of your designs with SafeStack's insightful blog post.
What is SOC 2: a beginner’s guide to compliance
Learn about SOC 2 and its role in protecting customer data in our blog post. Explore the principles of this security framework and how it assists companies in securely managing data in the cloud.
Sprint #6: Looking after your libraries
Enhance your understanding of 3rd party software security risks in the latest episode of SafeStack OneHourAppSec. Discover budget-friendly ways to track changes and automate processes for easier management.
Sprint #5: Making good library choices
Explore the risks of 3rd party components in software supply chains with SafeStack OneHourAppSec. Learn to assess security and implement a process for new software components.
Template | PCI DSS Control List
Simplify your PCI DSS project tasks with a free template from SafeStack. This JSON file outlines control requirements, SAQ, testing method, and priority for easy prioritization.
Template | Security Code Review Checklist
Improve your code review process with this free template from SafeStack. Spot vulnerabilities proactively and keep your development team on the same secure page with consistent, actionable steps.
Template | How to Secure Administrative Access to the Cloud
Discover essential tips for securing administrative access in cloud platforms like Google Cloud Platform, Microsoft Azure, and Amazon Web Services with our free template from safestack.
Template | Six steps to cyber security for small businesses
Protect your small business from cyber threats with our SafeStack free guide! Learn the 6 essential steps to secure your digital assets and stay safe online.
Sprint #4: Securing your source code
Discover the latest episode of SafeStack OneHourAppSec. Learn why protecting your source code is crucial for software security. Join us as we explore access control, configuration, and more.
Sprint #3: Embracing laziness
Discover how to streamline application security tasks and automate repetitive processes in the latest episode of SafeStack OneHourAppSec. Join us as we explore ways to make appsec easier.
Sprint #2: How bad can it be
Discover how to handle software security issues and assess their severity in our latest episode of Safestack OneHourAppSec. Don't panic, it's just math!
Sprint #1: Start where you are
Join us for the first episode of OneHourAppSec as we dive into application security. Learn how to identify your software and manage security debt effectively. Let's secure your apps together!
How to stay safe when inheriting third-party code
Discover how to select secure code libraries and maintain them effectively with this practical guide. Learn how to safeguard your software from 3rd party vulnerabilities today.
What is SBOM and why should we care?
Discover the significance of SBOM (software bill of materials) in software development on our new Safestack blog. Uncover the origins of SBOM and how it influences your work.
How to build software products that are “Secure by Default”
Explore the concept of "Secure by Default" in our new Safestack blog post. Learn how this global movement is shaping software security for your team and projects.
What are the “Secure by Design” and “Secure by Default” approaches to software security?
Discover the new safestack blog, where we explore the shift towards Secure by Design and Secure by Default approaches in tech manufacturing. Break the cycle of post-release fixes and ensure security from the start.