Secure Coding

Best practices for secure coding in your organization.

  • How much is your personal data really worth on the dark web?

    How much is your personal data really worth on the dark web?

    Read Article
  • Cybersecurity and Insurance: Why Hackers Target Insurance Companies

    Cybersecurity and Insurance: Why Hackers Target Insurance Companies

    Learn why hackers target insurance companies and how much your personal data is really worth on the dark web

    Read Article
  • Why Hackers Target Insurance Companies

    Why Hackers Target Insurance Companies

    Read Flipbook
  • Think You're Short Staffed Now?

    Think You're Short Staffed Now?

    Read Flipbook
  • Balancing Speed with Security in Application Development

    Balancing Speed with Security in Application Development

    While some Agile software development methodologies may work better than others, the question is whether or not organizations are delivering software with enough security built-in.

    Read Article
  • Why Businesses Need to Go Fast and Stay Safe

    Why Businesses Need to Go Fast and Stay Safe

    Learn why organizations who are bringing products to market faster are automating balanced development at the beginning of the software development lifecycle.

    Read Article
  • Development Devil's Choice

    Development Devil's Choice

    Learn about what happens when security vulnerabilities are identified in software already deployed in a customer’s environment.

    Read Article
  • Software Factory uses SD Elements

    Software Factory uses SD Elements

    Read Flipbook
  • 7 Tips to Building a Security Culture Within an Organization

    7 Tips to Building a Security Culture Within an Organization

    Learn about the best practices for building and infusing a security culture within an organization.

    Read Article
  • A Guide to Application Security

    A Guide to Application Security

    Learn more about application security.

    Read Flipbook
  • Engineering Privacy into Software

    Engineering Privacy into Software

    Learn about the importance of engineering privacy into software.

    Read Article
  • Best Practices to Code Securely

    Best Practices to Code Securely

    Tips to help you stay on top of secure coding requirements.

    Read Article
  • Major Financial Institution Makes SD Elements Part of Standard Development Process to 7000 Applications

    Major Financial Institution Makes SD Elements Part of Standard Development Process to 7000 Applications

    Read Article
  • A Large Technology Client Uses SD Elements to Manage Compliance with Internal Secure Coding Standards for Nearly 80% of Applications

    A Large Technology Client Uses SD Elements to Manage Compliance with Internal Secure Coding Standards for Nearly 80% of Applications

    Read Article
  • SD Elements in the Modern Enterprise

    SD Elements in the Modern Enterprise

    Our expert platform, SD Elements, fills a handful of security gaps in the modern enterprise. Learn about its use cases here.

    Read Flipbook
  • Choosing the Right Security Requirements Solution for your Organization

    Choosing the Right Security Requirements Solution for your Organization

    Imagine turning on the radio and discovering that there is only one radio station playing one artist who has the only musical instrument in the world. Now imagine that radio is the only way to...

    Read Article
  • GDP 101  GDPR for Developers

    GDP 101 GDPR for Developers

    Learn about our course, GDPR for Developers.

    Read Flipbook
  • A World with Security-Minded Developers: What Will It Take?

    A World with Security-Minded Developers: What Will It Take?

    Pranoy De, Solutions Engineer at Security Compass, tells us what it's like to take on security as an engineer.

    Read Article
  • SD Elements Minimizes Security Risks in Software Built by 3rd Party Developers

    SD Elements Minimizes Security Risks in Software Built by 3rd Party Developers

    SD Elements can be used to reduce security risk in software developed by 3rd parties in your organization.

    Read Article
  • Find and Fix Your Application Security Pain Points

    Find and Fix Your Application Security Pain Points

    It can be tough creating and implementing a secure application development process. There are so many project-specific vulnerabilities and requirements that it’s hard to make sure you’re covering...

    Read Article
  • loading
    Loading More...