Security Compass Blog

Learn about the latest trends in application security

  • How Cybersecurity Can Enhance the Brand Image of Retailers

    How Cybersecurity Can Enhance the Brand Image of Retailers

    Establishing a strong cybersecurity stance can elevate your brand image and assure your customers that you’re mindful of their needs.

    Read Article
  • Cutting Cybersecurity Budgets to Save Costs During Slowdown

    Cutting Cybersecurity Budgets to Save Costs During Slowdown

    Organizations are considering cybersecurity budget cuts to save costs during the current slowdown. Read why that might not be the best strategy right now.

    Read Article
  • Making Remote Access More Secure Post-COVID-19

    Making Remote Access More Secure Post-COVID-19

    With the sudden move to remote work, organizations haven't been able to consider the security ramifications of accessing network assets from homes. Learn how you can make remote access more secure.

    Read Article
  • Check Out Upcoming Events & Webinars!

    More Info
  • U.S. Federal Government: Scaling DevSecOps for Secure Application Development

    U.S. Federal Government: Scaling DevSecOps for Secure Application Development

    Speed and innovation are always in demand. But in the face of sophisticated cyberattacks, federal government agencies need to prioritize cybersecurity.

    Read Article
  • How to Assess the Business Value of Security in Software Development?

    How to Assess the Business Value of Security in Software Development?

    Most discussions focus on the tactical benefits of security in software development. It would be easier to integrate security if we talk about its business value.

    Read Article
  • Think Like a Recruiter to Get Your Next Job: Part 3

    Think Like a Recruiter to Get Your Next Job: Part 3

    This week’s post is the final part of our blog series and we are sharing tips on what makes a good interview, creating rapport with your interviewer, and how to leverage referrals.

    Read Article
  • Think Like a Recruiter to Get Your Next Job: Part 2

    Think Like a Recruiter to Get Your Next Job: Part 2

    Following our last week’s post with tips on how to get your resume picked by a recruiter, this week we want to share a few tips on how to prepare for an interview and important details to mention.

    Read Article
  • Think Like a Recruiter to Get Your Next Job: Part 1

    Think Like a Recruiter to Get Your Next Job: Part 1

    With several talented people displaced by COVID-19, we thought about talking to our in-house recruiters to understand how they think while recruiting so that it can help current jobseekers.

    Read Article
  • Why Balanced Software Development Accelerates Time to Market

    Why Balanced Software Development Accelerates Time to Market

    Do you think the friction between security and development slows down the SDLC? Learn how to manage security without slowing down development.

    Read Article
  • A Better Way to Develop Software Security: Go Fast and Stay Safe

    A Better Way to Develop Software Security: Go Fast and Stay Safe

    Learn why the requirement for software security is putting greater demands on organizations.

    Read Article
  • Leveraging Corporate Best Practices in Threat Modeling

    Leveraging Corporate Best Practices in Threat Modeling

    Smart organizations understand that taking a proactive approach to security and providing engineering with the tools and responsibility for building secure software is more effective.

    Read Article
  • A Message From Our CEO

    A Message From Our CEO

    Our commitment to our customers, prospects, partners, and communities.

    Read Article
  • Empowering Women in the Workplace – A Work in Progress.

    Empowering Women in the Workplace – A Work in Progress.

    Learn about empowering women in the Workplace.

    Read Article
  • Inclusion -- Past, Present, and Future

    Inclusion -- Past, Present, and Future

    How did we make here to 2020 as Best Workplace for inclusion? At Security Compass, we start everything with trust.

    Read Article
  • RSA Presentation: Integrating our DevSecOps Product Pipeline with Software Security Standards

    RSA Presentation: Integrating our DevSecOps Product Pipeline with Software Security Standards

    This session covered the dynamic nature of both security standards and DevOps technologies in our product development pipeline.

    Read Article
  • RSA Presentation: At What Point Does DevSecOps Become Too Risky for the Business?

    RSA Presentation: At What Point Does DevSecOps Become Too Risky for the Business?

    This session covered the implementation of an automated, continuous risk pipeline that demonstrates how cyber-resiliency and compliance risk can be traced to and from DevSecOps teams.

    Read Article
  • SB327: A new frontier in technology and privacy lawmaking

    SB327: A new frontier in technology and privacy lawmaking

    SB327 is a new frontier in lawmaking because while it’s fascinating how technology becomes regulated, it’s even more fascinating to see it evolve.

    Read Article
  • A Quick Insight into Security Compass’ New CEO, Rohit Sethi

    A Quick Insight into Security Compass’ New CEO, Rohit Sethi

    A Quick Insight into Security Compass’ New CEO, Rohit Sethi

    Read Article
  • Financial Enterprise Architecture and Security in Digital Transformation

    Financial Enterprise Architecture and Security in Digital Transformation

    Learn more about financial enterprise architecture and security in digital transformation

    Read Article
  • After CCPA, what’s next? A look at US and global privacy trends.

    After CCPA, what’s next? A look at US and global privacy trends.

    Learn more about how the CCPA has put pressure on some of the largest tech companies to re-evaluate how they handle personal information.

    Read Article
  • loading
    Loading More...