Home
Learn from our resources on Application Security, DevSecOps, Compliance, and more.
-
Building a Product Security Practice in a DevOps World
What is product security and how does it differ from software security? Learn why product security is gaining popularity and how you can build key capabilities.
-
Check Out Upcoming Events & Webinars!
Learn More -
Revisiting Work-from Home Infrastructure
An overview for IT and security professionals making the shift from temporary to long-term remote work strategies.
-
1:38
Balanced Development Automation
Balanced Development Automation enables you to build secure digital products without compromising time to market. Learn how it can work for your organization
-
Find out how our solution builds security and compliance into software.
Get a Free Demo -
The Future of Cybersecurity: Five Emerging Trends
2020 upended security strategies and IT roadmaps. Our team identified five cybersecurity trends that will influence security and business priorities moving ahead.
-
Responding to Ryuk: Healthcare and the Ransomware Threat
Learn how penetration testing can help healthcare providers resist attacks from Ryuk Ransomware, keep patient records secure, and provide uninterrupted care.
-
API Security Testing: Best Practices & Key Vulnerabilities
Attackers are following the trajectory of software development and have their eyes on APIs. Regularly testing the security of your APIs reduces your risk.
-
Cloud Adoption in the Financial Services Industry
Despite the benefits of cloud computing, financial institutions lag behind other industries in terms of cloud adoption. The risk of data loss and regulatory compliance are some of the major concerns.
-
Insurance Data Security Model Law – What It Means for Software Security
The Data Security Model Law impacts everyone working in the insurance industry and requires insurers to maintain an information security program. Learn the requirements under this law.
-
VotingWorks Partners with Security Compass to Secure Risk-Limiting Audit Software Arlo
Arlo, a secure and open-source election audit tool developed by VotingWorks, assessed by Security Compass, was used to support Georgia’s full hand-count audit.
-
A 5G Security Overview
The emergence of the fifth generation of cellular technology will revolutionize the world and facilitate unprecedented use of internet-connected devices.
-
Link software development to measured business value creation
Companies must balance customer needs against potential risks during software development to ensure they aren't ignoring security but not falling behind competitors at the same time.
-
16 Essential Things To Consider When Hiring An Outsourced Tech Partner
To help you forge a successful partnership when hiring a tech partner, we turned to a panel of experts from Forbes Technology Council for essentials to consider.
-
How You Can Ensure Secure Cloud Migration
Cloud migrations offer a lot of benefits, but you need to ensure data security to make the move successful. Learn how you can migrate securely.
-
59:40
Enterprise Architecture & Security
Learn how to use Enterprise Architecture as a framework for achieving this balance. Ultimately, value creation is unique to each organization.
-
Bridging the Gap in the Security Knowledge of Developers
Relevant, just-in-time secure coding training can help developers learn fast and retain more knowledge. Read more to know about effective security training.
-
58:18
Turn Security from a Blocker to an Enabler for Lean Software Development
In this webinar, we will examine how security can be an enabler for lean software development.
-
Vulnerability Scanners: Are These Enough for Your Applications?
Security testing has increased considerably over the past decade. But are vulnerability scanners enough to ensure software security?
-
Can Developers Become Security Ninjas?
Many data breaches are a result of common software flaws or buggy web applications. Can developers avoid these breaches through software security training?
-
FINRA Leverages SD Elements to Mitigate Risks and Improve Time to Market
Threat modeling is a time-consuming process that requires the expertise of security professionals. Learn how FINRA leveraged SD Elements to rapidly identify and mitigate risks.
-
59:35
Build a Sustainable E-Learning Program that Delivers Value
This webinar will walk through the science of e-learning and discuss how to think about designing an effective program that delivers measurable business value.
-
Loading More...