Security Compass Blog

Guidance on security, enterprise IT, DevOps, and more.

  • Is security slowing time to market of your app - losing your competitive advantage?

    Is security slowing time to market of your app - losing your competitive advantage?

    Learn how balanced software development accelerates time to market.

    Read Article
  • Leveraging Corporate Best Practices in Threat Modeling

    Leveraging Corporate Best Practices in Threat Modeling

    Smart organizations understand that taking a proactive approach to security and providing engineering with the tools and responsibility for building secure software is more effective.

    Read Article
  • Inclusion -- Past, Present, and Future

    Inclusion -- Past, Present, and Future

    How did we make here to 2020 as Best Workplace for inclusion? At Security Compass, we start everything with trust.

    Read Article
  • Check Out Upcoming Events & Webinars!

    More Info
  • A message from our CEO

    A message from our CEO

    Our commitment to our customers, prospects, partners, and communities.

    Read Article
  • RSA Presentation: Integrating Our DevSecOps Product Pipeline with Software Security Standards

    RSA Presentation: Integrating Our DevSecOps Product Pipeline with Software Security Standards

    This session covered the dynamic nature of both security standards and DevOps technologies in our product development pipeline.

    Read Article
  • RSA Presentation: At What Point Does DevSecOps Become Too Risky for the Business?

    RSA Presentation: At What Point Does DevSecOps Become Too Risky for the Business?

    This session covered the implementation of an automated, continuous risk pipeline that demonstrates how cyber-resiliency and compliance risk can be traced to and from DevSecOps teams.

    Read Article
  • SB327: A new frontier in technology and privacy lawmaking

    SB327: A new frontier in technology and privacy lawmaking

    SB327 is a new frontier in lawmaking because while it’s fascinating how technology becomes regulated, it’s even more fascinating to see it evolve.

    Read Article
  • A better way to develop software security: Go Fast and Stay Safe.

    A better way to develop software security: Go Fast and Stay Safe.

    Learn why the requirement for software security is putting greater demands on organizations.

    Read Article
  • A Quick Insight into Security Compass’ New CEO, Rohit Sethi

    A Quick Insight into Security Compass’ New CEO, Rohit Sethi

    A Quick Insight into Security Compass’ New CEO, Rohit Sethi

    Read Article
  • Financial Enterprise Architecture and Security in Digital Transformation

    Financial Enterprise Architecture and Security in Digital Transformation

    Learn more about financial enterprise architecture and security in digital transformation

    Read Article
  • After CCPA, what’s next? A look at US and global privacy trends.

    After CCPA, what’s next? A look at US and global privacy trends.

    Learn more about how the CCPA has put pressure on some of the largest tech companies to re-evaluate how they handle personal information.

    Read Article
  • Cybersecurity and Insurance: Why Hackers Target Insurance Companies

    Cybersecurity and Insurance: Why Hackers Target Insurance Companies

    Learn why hackers target insurance companies and how much your personal data is really worth on the dark web

    Read Article
  • Balancing Speed with Security in Application Development

    Balancing Speed with Security in Application Development

    While some Agile software development methodologies may work better than others, the question is whether or not organizations are delivering software with enough security built-in.

    Read Article
  • Why Businesses Need to Go Fast and Stay Safe

    Why Businesses Need to Go Fast and Stay Safe

    Learn why organizations who are bringing products to market faster are automating balanced development at the beginning of the software development lifecycle.

    Read Article
  • Development Devil's Choice

    Development Devil's Choice

    Learn about what happens when security vulnerabilities are identified in software already deployed in a customer’s environment.

    Read Article
  • How a Positive Security Culture is a Win-Win for the Business

    How a Positive Security Culture is a Win-Win for the Business

    Security culture affects the bottom line. If every employee aligns with the security culture, software gets developed with the right amount of acceptable risk.

    Read Article
  • An Introduction to Enterprise Architecture and Security in Digital Transformation

    An Introduction to Enterprise Architecture and Security in Digital Transformation

    Learn about enterprise architecture and security in digital transformation

    Read Article
  • Managing Risk at Scale: Does the Modern Software Company Have Room for Threat Modeling? Part 1

    Managing Risk at Scale: Does the Modern Software Company Have Room for Threat Modeling? Part 1

    Is threat modeling a blocker for security in your organization when it should be an enabler? If it is, you’re not the only one.

    Read Article
  • Managing Risk at Scale: Does the Modern Software Company Have Room for Threat Modeling? Part 2

    Managing Risk at Scale: Does the Modern Software Company Have Room for Threat Modeling? Part 2

    Learn more about lightweight threat modeling at scale.

    Read Article
  • FedRAMP and Authority to Operate (ATO) – Driving Business

    FedRAMP and Authority to Operate (ATO) – Driving Business

    Learn about the two distinct ways to demonstrate FedRAMP compliance & obtain a FedRAMP Authority to Operate (ATO).

    Read Article
  • loading
    Loading More...