Home

Learn from our resources on Application Security, DevSecOps, Compliance, and more.

  • Insurance Data Security Model Law – What It Means for Software Security

    Insurance Data Security Model Law – What It Means for Software Security

    The Data Security Model Law impacts everyone working in the insurance industry and requires them to maintain an information security program. Learn the requirements under this law.

    Read Flipbook
  • Check Out Upcoming Events & Webinars!

    Learn More
  • VotingWorks Partners with Security Compass to Secure Risk-Limiting Audit Software Arlo

    Arlo, a secure and open-source election audit tool developed by VotingWorks, assessed by Security Compass, was used to support Georgia’s full hand-count audit.

    Read Article
  • A 5G Security Overview

    A 5G Security Overview

    The emergence of the fifth generation of cellular technology will revolutionize the world and facilitate unprecedented use of internet-connected devices.

    Read Flipbook
  • Find out how our solution builds security and compliance into software.

    Get a Free Demo
  • Link software development to measured business value creation

    Link software development to measured business value creation

    Companies must balance customer needs against potential risks during software development to ensure they aren't ignoring security but not falling behind competitors at the same time.

    Read Article
  • 16 Essential Things To Consider When Hiring An Outsourced Tech Partner

    16 Essential Things To Consider When Hiring An Outsourced Tech Partner

    To help you forge a successful partnership when hiring a tech partner, we turned to a panel of experts from Forbes Technology Council for essentials to consider.

    Read Article
  • Building a Security Culture | Speakers: Jaynee Beach, John Martin, Spencer Koch, Ayhan Tek & Altaz Valani

    Building a Security Culture | Speakers: Jaynee Beach, John Martin, Spencer Koch, Ayhan Tek & Altaz Valani

    Dec 10, 2020 | Thursday, 11:00 a.m. (EST)

    Read Article
  • How You Can Ensure Secure Cloud Migration

    How You Can Ensure Secure Cloud Migration

    Cloud migrations offer a lot of benefits, but you need to ensure data security to make the move successful. Learn how you can migrate securely.

    Read Flipbook
  • Enterprise Architecture & Security59:40

    Enterprise Architecture & Security

    Learn how to use Enterprise Architecture as a framework for achieving this balance. Ultimately, value creation is unique to each organization.

    Watch Video
  • Bridging the Gap in Security Knowledge of Developers

    Bridging the Gap in Security Knowledge of Developers

    Relevant, just-in-time secure coding training can help developers learn fast and retain more knowledge. Read more to know about effective security training.

    Read Article
  • Turn Security from a Blocker to an Enabler for Lean Software Development58:18

    Turn Security from a Blocker to an Enabler for Lean Software Development

    In this webinar, we will examine how security can be an enabler for lean software development.

    Watch Video
  • Vulnerability Scanners: Are These Enough for Your Applications?

    Vulnerability Scanners: Are These Enough for Your Applications?

    Security testing has increased considerably over the past decade. But are vulnerability scanners enough to ensure software security?

    Read Article
  • Can Developers Become Security Ninjas?

    Can Developers Become Security Ninjas?

    Many data breaches are a result of common software flaws or buggy web applications. Can developers avoid these breaches through software security training?

    Read Article
  • FINRA Leverages SD Elements to Mitigate Risks and Improve Time to Market

    FINRA Leverages SD Elements to Mitigate Risks and Improve Time to Market

    Threat modeling is a time-consuming process that requires the expertise of security professionals. Learn how FINRA leveraged SD Elements to rapidly identify and mitigate risks.

    Read Flipbook
  • Build a Sustainable E-Learning Program that Delivers Value59:35

    Build a Sustainable E-Learning Program that Delivers Value

    This webinar will walk through the science of e-learning and discuss how to think about designing an effective program that delivers measurable business value.

    Watch Video
  •  What to Look for in a Penetration Testing Provider

    What to Look for in a Penetration Testing Provider

    Ask these five questions to find a penetration testing provider that both satisfies your technical needs and works in harmony with your business.

    Read Article
  • SaaS Deployments: Security Checklist for Cloud Services

    SaaS Deployments: Security Checklist for Cloud Services

    Moving applications from on-premise to SaaS brings a different set of risks. First among those is the fact that users data is stored in the SaaS provider's data center.

    Read Article
  • Mapping Security Awareness Training to Regulatory Requirements

    Mapping Security Awareness Training to Regulatory Requirements

    Most regulatory standards require organizations to provide security awareness training to their employees. Download this whitepaper to learn how you can comply with these requirements.

    Read Flipbook
  • Cybersecurity Awareness Month: 10 Tips for Better IoT Security

    Cybersecurity Awareness Month: 10 Tips for Better IoT Security

    This Cybersecurity Awareness Month, take time to consider all the devices you have online. These 10 tips will help you create or strengthen your IoT security plan.

    Read Article
  • Developers: Are You Losing Sleep Over Software Vulnerabilities?

    Developers: Are You Losing Sleep Over Software Vulnerabilities?

    How frustrating is it to keep finding vulnerabilities in your code and trying to resolve false positives from scanners when you're on a time crunch?

    Read Article
  • How Can Developers Avoid Software Vulnerabilities?

    How Can Developers Avoid Software Vulnerabilities?

    After spending hours writing code, every developer dreads hearing they'll have to spend additional hours remediating the code. Through automation, these vulnerabilities can be easily avoided.

    Read Article
  • loading
    Loading More...