Security Compass Blog
Learn about what's happening in software development and application security.
-
The Future of Cybersecurity: Five Emerging Trends
2020 upended security strategies and IT roadmaps. Our team identified five cybersecurity trends that will influence security and business priorities moving ahead.
-
Using Balanced Development Automation to Achieve Both Speed and Security for CMMC
CMMC is a means of unifying cybersecurity standards for the U.S. Department of Defense. Learn how you can achieve compliance with this new standard.
-
Responding to Ryuk: Healthcare and the Ransomware Threat
Learn how penetration testing can help healthcare providers resist attacks from Ryuk Ransomware, keep patient records secure, and provide uninterrupted care.
-
Check Out Upcoming Events & Webinars!
Learn More -
API Security Testing: Best Practices & Key Vulnerabilities
Attackers are following the trajectory of software development and have their eyes on APIs. Regularly testing the security of your APIs reduces your risk.
-
Vulnerability Scanners: Are These Enough for Your Applications?
Security testing has increased considerably over the past decade. But are vulnerability scanners enough to ensure software security?
-
Start My Free Trial Today!
Get Started -
What to Look for in a Penetration Testing Provider
Ask these five questions to find a penetration testing provider that both satisfies your technical needs and works in harmony with your business.
-
SaaS Deployments: Security Checklist for Cloud Services
Moving applications from on-premise to SaaS brings a different set of risks. First among those is the fact that users data is stored in the SaaS provider's data center.
-
Cybersecurity Awareness Month: 10 Tips for Better IoT Security
This Cybersecurity Awareness Month, take time to consider all the devices you have online. These 10 tips will help you create or strengthen your IoT security plan.
-
Why Conduct a Red Team Exercise?
Businesses who conduct Red Team exercises have reduced costs when a data breach occurs.
-
Addressing Cloud Security Risks: Build a Foundation for a Secure Future
Cloud adoption has gone mainstream. Taking full advantage of the benefits takes planning, skill, and a careful weighing of cloud security risks.
-
Best Practices for Hybrid Cloud Security
Securing a hybrid cloud environment can be challenging, but these best practices will help businesses minimize risk while taking advantage of the benefits.
-
Is Zero Trust Just a Buzzword?
Zero trust essentially involves changing the approach toward securing our systems and infrastructure. Read more to learn how you can prevent data breaches with this approach.
-
What You Need to Know About Enterprise Penetration Testing in AWS
As more organizations adopt AWS services, penetration testing is critical for designing, securing, reviewing, and improving your cloud infrastructure.
-
A 5G Security Overview
A detailed introduction to 5G technology and security concepts.
-
How Insurers Can Stay Secure While Transforming the Way They Do Business
Digital transformation is at the heart of the changing landscape in the insurance space, however, insurers must consider the risk implications of any change.
-
Start My Free Trial Today!
Get Started -
How Secure Is Canada’s COVID Alert App? Evaluation of Android App v1.0.3
Our consulting team performed an evaluation of the Android version of Canada’s COVID alert app to evaluate data privacy and security concerns.
-
Building Security Into DevOps Processes
DevOps teams are always under tremendous pressure to release products faster while integrating security. How can they achieve these goals?
-
Aligning Security to Your Business Goals
Security teams add immense value to the overall business, however, they’re often unable to communicate their value in terms of growth and profitability. Read on to learn how you can achieve this.
-
Accelerating Digital Transformation in Banking: Why a Strong Security Program Is Key
Building security into a bank’s digital transformation plan enables financial institutions to move at the speed of business and prevent setbacks from data breaches.
-
Evolving Threat Modeling to Fit DevOps
Many security teams still use data flow diagrams to build security into applications. But, is that the right threat modeling approach for security?
-
Loading More...