SafeStack Blog
Keep up to date with the latest news and trends in secure development, security culture with our articles, templates and resources
Featured Articles
Template | Six steps to cyber security for small businesses
Protect your small business from cyber threats with our SafeStack free guide! Learn the 6 essential steps to secure your digital assets and stay safe online.
Webinar | Security and Software Testing: Better Together
Unite security and software testing with insights from SafeStack founder Laura Bell Main in a webinar. Learn why this combination is crucial, how to navigate obstacles, and why it's worth the effort.
Webinar | Building a Secure Development Culture at Speed
Discover the importance of secure development with SafeStack founder Laura Bell Main. Overcome challenges in building a secure culture at speed with real-life examples in this panel discussion.
Webinar | Microservices and Security
Discover the secrets of building secure microservices with SafeStack founder Laura Bell Main and microservices expert Sam Newman. Join our webinar to learn about the latest trends in microservices security.
Sprint #4: Securing your source code
Discover the latest episode of SafeStack OneHourAppSec. Learn why protecting your source code is crucial for software security. Join us as we explore access control, configuration, and more.
Sprint #3: Embracing laziness
Discover how to streamline application security tasks and automate repetitive processes in the latest episode of SafeStack OneHourAppSec. Join us as we explore ways to make appsec easier.
Changing the software development industry, one student at a time
SafeStack: Building a Secure Future for Software Developers in NZ & AU. Learn about our sponsorship program enabling students to learn secure development early in their career.
Sprint #2: How bad can it be
Discover how to handle software security issues and assess their severity in our latest episode of Safestack OneHourAppSec. Don't panic, it's just math!
Sprint #1: Start where you are
Join us for the first episode of OneHourAppSec as we dive into application security. Learn how to identify your software and manage security debt effectively. Let's secure your apps together!
How to stay safe when inheriting third-party code
Discover how to select secure code libraries and maintain them effectively with this practical guide. Learn how to safeguard your software from 3rd party vulnerabilities today.
What is SBOM and why should we care?
Discover the significance of SBOM (software bill of materials) in software development on our new Safestack blog. Uncover the origins of SBOM and how it influences your work.
How to build software products that are “Secure by Default”
Explore the concept of "Secure by Default" in our new Safestack blog post. Learn how this global movement is shaping software security for your team and projects.
What Secure by Design means for software development teams
Unveil the secrets of Secure by Design on the new safestack blog. Learn how this mindset shift affects software developers and team leads. Dive into the world of secure software development today!
What are the “Secure by Design” and “Secure by Default” approaches to software security?
Discover the new safestack blog, where we explore the shift towards Secure by Design and Secure by Default approaches in tech manufacturing. Break the cycle of post-release fixes and ensure security from the start.
How to improve software security outcomes by teaching good engineers to be bad people
Discover the power of curiosity and playfulness in software engineering on the Safestack blog. Embrace your inner child to create more secure software.
How to introduce a new security rituals into an existing software development lifecycle
Enhance the security of your software with new rituals, processes, and tools that can be seamlessly integrated into your software development lifecycle (SDLC). Explore more in this detailed guide.
How ChatGPT impacts cyber security and how to get your team safely started with it
Discover the impact of ChatGPT on cyber security and find out how to securely introduce it to your team. Start now!
How to use Behavior-Driven Development (BDD) to design software with villains in mind
Discover the importance of considering evil villains in software design to strengthen your cyber security defenses and safeguard your data.
The role of product management in cyber security
Discover the crucial role of product management in cyber security and how it can be your organization's secret weapon when it comes to building secure software. Learn more in this article.