Home

Learn from our resources on Application Security, DevSecOps, Compliance, and more.

  • Selecting an eLearning Solution for a Software Security Environment

    Selecting an eLearning Solution for a Software Security Environment

    Read Flipbook
  • Check Out Upcoming Events & Webinars!

    More Info
  • Modernizing Risk Assessment to Support Your Business’ DevOps57:36

    Modernizing Risk Assessment to Support Your Business’ DevOps

    With agile & DevOps initiatives taking place in many organizations today, risk assessment processes need to be modernized in order to support the business in managing security risk in a timely, effici

    Watch Video
  • SD Elements - Enabling Automated Risk Management and Continuous Compliance5:17

    SD Elements - Enabling Automated Risk Management and Continuous Compliance

    SD Elements is an automated system that tracks security and compliance standards and translates them into actionable tasks across various software stacks. The latest version 5.0 goes beyond just buil

    Watch Video
  • Find out how our solution builds security and compliance into software.

    Get a Free Demo
  • Controlling Shadow IT Projects

    Controlling Shadow IT Projects

    Read Flipbook
  • Automating the Discovery of Shadow IT to Ensure Compliance38:19

    Automating the Discovery of Shadow IT to Ensure Compliance

    Join Jeremiah Grossman, Founder & CEO of Bit Discovery, and Rohit Sethi, COO at Security Compass, to discuss Shadow IT, one of the most pressing operational challenges today. Learn how you can get a h

    Watch Video
  • A Guide to Application Security

    A Guide to Application Security

    Learn more about application security.

    Read Flipbook
  • Cubic Uses SD Elements to Improve Cyber Resilience

    Cubic Uses SD Elements to Improve Cyber Resilience

    Read Flipbook
  • Games or Learning?

    Games or Learning?

    Learn about the advantages of gamified learning.

    Read Article
  • ×

    Sign up for our newsletter

    !
    Thank you!
    Error - something went wrong!
  • The SD Elements Solution

    The SD Elements Solution

    Read Flipbook
  • The New Reality – A Complex and Constantly Changing Environment

    The New Reality – A Complex and Constantly Changing Environment

    Read Flipbook
  • The Shadow IT Problem

    The Shadow IT Problem

    Learn more about the risks of shadow IT.

    Read Article
  • Scaling Software Risk Assessments

    Scaling Software Risk Assessments

    Read Flipbook
  • It's Here – SD Elements Version 5!

    It's Here – SD Elements Version 5!

    Learn more about our latest release of SD Elements.

    Read Article
  • Enabling Governance in DevOps: the myth of security as a disruptor

    Enabling Governance in DevOps: the myth of security as a disruptor

    Learn more about how you can enable governance in a DevOps environment.

    Read Article
  • The New Security and Compliance Tool for Enterprise: The Policy-to-Execution Platform

    The New Security and Compliance Tool for Enterprise: The Policy-to-Execution Platform

    Learn more about the new tool for enterprise: the policy-to-execution platform.

    Read Article
  • Scaling Risk Assessments for Applications

    Scaling Risk Assessments for Applications

    Risk assessments are integral to the modern organization’s success, but they’re also time-consuming and difficult to manage. Learn how you can scale threat risk assessments in your organization.

    Read Article
  • Capital One Breach4:16

    Capital One Breach

    Watch Video
  • FireEye Selects Security Compass's eLearning Solution

    FireEye Selects Security Compass's eLearning Solution

    Read Flipbook
  • Scaling Application Security with SD Elements

    Scaling Application Security with SD Elements

    Read Flipbook
  • Zoom Security Flaw for Macs5:34

    Zoom Security Flaw for Macs

    It was discovered that Zoom Video Communications (Zoom) had a major security flaw in how their video messaging worked on Apple Mac computers. Learn about the vulnerability, how it was resolved and how

    Watch Video
  • loading
    Loading More...