Security Compass Blog

Learn about what's happening in software development and application security.

  • Vulnerability Scanners: Are These Enough for Your Applications?

    Vulnerability Scanners: Are These Enough for Your Applications?

    Security testing has increased considerably over the past decade. But are vulnerability scanners enough to ensure software security?

    Read Article
  •  What to Look for in a Penetration Testing Provider

    What to Look for in a Penetration Testing Provider

    Ask these five questions to find a penetration testing provider that both satisfies your technical needs and works in harmony with your business.

    Read Article
  • SaaS Deployments: Security Checklist for Cloud Services

    SaaS Deployments: Security Checklist for Cloud Services

    Moving applications from on-premise to SaaS brings a different set of risks. First among those is the fact that users data is stored in the SaaS provider's data center.

    Read Article
  • Check Out Upcoming Events & Webinars!

    Learn More
  • Cybersecurity Awareness Month: 10 Tips for Better IoT Security

    Cybersecurity Awareness Month: 10 Tips for Better IoT Security

    This Cybersecurity Awareness Month, take time to consider all the devices you have online. These 10 tips will help you create or strengthen your IoT security plan.

    Read Article
  • Why Conduct a Red Team Exercise?

    Why Conduct a Red Team Exercise?

    Businesses who conduct Red Team exercises have reduced costs when a data breach occurs.

    Read Article
  • Addressing Cloud Security Risks: Build a Foundation for a Secure Future

    Addressing Cloud Security Risks: Build a Foundation for a Secure Future

    Cloud adoption has gone mainstream. Taking full advantage of the benefits takes planning, skill, and a careful weighing of cloud security risks.

    Read Article
  •  Best Practices for Hybrid Cloud Security

    Best Practices for Hybrid Cloud Security

    Securing a hybrid cloud environment can be challenging, but these best practices will help businesses minimize risk while taking advantage of the benefits.

    Read Article
  • Is Zero Trust Just a Buzzword?

    Is Zero Trust Just a Buzzword?

    Zero trust essentially involves changing the approach toward securing our systems and infrastructure. Read more to learn how you can prevent data breaches with this approach.

    Read Article
  • What You Need to Know About Enterprise Penetration Testing in AWS

    What You Need to Know About Enterprise Penetration Testing in AWS

    As more organizations adopt AWS services, penetration testing is critical for designing, securing, reviewing, and improving your cloud infrastructure.

    Read Article
  • A 5G Security Overview

    A 5G Security Overview

    A detailed introduction to 5G technology and security concepts.

    Read Article
  • How Insurers Can Stay Secure While Transforming the Way They Do Business

    How Insurers Can Stay Secure While Transforming the Way They Do Business

    Digital transformation is at the heart of the changing landscape in the insurance space, however, insurers must consider the risk implications of any change.

    Read Article
  • How Secure Is Canada’s COVID Alert App? Evaluation of Android App v1.0.3

    How Secure Is Canada’s COVID Alert App? Evaluation of Android App v1.0.3

    Our consulting team performed an evaluation of the Android version of Canada’s COVID alert app to evaluate data privacy and security concerns.

    Read Article
  • Building Security Into DevOps Processes

    Building Security Into DevOps Processes

    DevOps teams are always under tremendous pressure to release products faster while integrating security. How can they achieve these goals?

    Read Article
  • Aligning Security to Your Business Goals

    Aligning Security to Your Business Goals

    Security teams add immense value to the overall business, however, they’re often unable to communicate their value in terms of growth and profitability. Read on to learn how you can achieve this.

    Read Article
  • Accelerating Digital Transformation in Banking: Why a Strong Security Program Is Key

    Accelerating Digital Transformation in Banking: Why a Strong Security Program Is Key

    Building security into a bank’s digital transformation plan enables financial institutions to move at the speed of business and prevent setbacks from data breaches.

    Read Article
  • Evolving Threat Modeling to Fit DevOps

    Evolving Threat Modeling to Fit DevOps

    Many security teams still use data flow diagrams to build security into applications. But, is that the right threat modeling approach for security?

    Read Article
  • Scenario Planning to Manage Security in DevSecOps

    Scenario Planning to Manage Security in DevSecOps

    One of the biggest challenges that remain in DevSecOps today is alignment between teams. Read how scenario planning can help overcome this challenge.

    Read Article
  • New Operating Model: Balancing Business Speed With Risk

    New Operating Model: Balancing Business Speed With Risk

    We're witnessing how new business models are enabling both software delivery speed and risk management. Learn why your organization needs this shift.

    Read Article
  • Bridging the Cybersecurity Talent Gap With Automation

    Bridging the Cybersecurity Talent Gap With Automation

    Considering the current talent shortage, the cybersecurity workforce needs to grow by 145 percent as per recent research. Can automation help the industry?

    Read Article
  • How to Explain the Importance of Cloud Security

    How to Explain the Importance of Cloud Security

    Cloud migrations come with a lot of benefits; making some people think their customer data is secure in the cloud environment. However, threats are always evolving.

    Read Article
  • loading
    Loading More...