Vimeo - All Videos

This Stream includes all Videos from Security Compass's Vimeo Account

  • Maintain Software Security During Code Changes58:00

    Maintain Software Security During Code Changes

    Developers make software updates to add new features, enhance their structures, or fix bugs. These frequent changes occasionally impact the security of the software, for instance, by breaking authenti

    Watch Video
  • Securing Remote Access Podcast4:29

    Securing Remote Access Podcast

    The swift move to remote work has raised many concerns about security. Get recommendations on securing remote access with real-world examples.

    Watch Video
  • What’s New in SD Elements 5.79:06

    What’s New in SD Elements 5.7

    Learn how you can quickly enable and modify project classifications, filter problems to help with prioritization, and more!

    Watch Video
  • Security Value Streams57:04

    Security Value Streams

    In a fast-evolving business context, every team must be able to articulate how they provide business value. For security teams, many times the conversation becomes too technical for a business stakeho

    Watch Video
  • How a Recruiter Thinks: Expert Tips on Finding a Job33:26

    How a Recruiter Thinks: Expert Tips on Finding a Job

    We are organizing this webinar to help job seekers find the right opportunities during these challenging times. As recruiters, we want to give you the inside scoop on how we think and share some essen

    Watch Video
  • Server-Side Request Forgery (SSRF): Defining a Hunt Methodology53:51

    Server-Side Request Forgery (SSRF): Defining a Hunt Methodology

    As web applications migrate to cloud environments and interactions between services become more complex, server-side request forgery (SSRF) attacks pose an increasing threat to businesses. Security te

    Watch Video
  • Balanced development automation for Risk Practitioner1:39

    Balanced development automation for Risk Practitioner

    Watch Video
  • Balanced development automation for Technology Practitioners1:42

    Balanced development automation for Technology Practitioners

    Watch Video
  • Balanced development automation for Technology Executives1:56

    Balanced development automation for Technology Executives

    Watch Video
  • The Intersection of Software Development and Privacy49:49

    The Intersection of Software Development and Privacy

    In today’s world, privacy concerns during software development are critical. We need to consider how we collect, store, share, and archive information across the DevSecOps process in a way that respec

    Watch Video
  • Using MITRE ATT&CK in the Cloud: TTPs, Tools, and Trajectory50:33

    Using MITRE ATT&CK in the Cloud: TTPs, Tools, and Trajectory

    Join our webinar for insight into the MITRE ATT&CK framework. Our team uses this framework extensively in on-premise infrastructure testing and during purple team exercises to test security controls.

    Watch Video
  • The Business Value of Security in DevSecOps58:40

    The Business Value of Security in DevSecOps

    Security measures in DevSecOps are sometimes seen as impediments to speed. The sole focus on security tools and vulnerability metrics does little to explain the business value of security. At its core

    Watch Video
  • Training Course Updates2:16

    Training Course Updates

    Watch Video
  • What's New With SD Elements v5.613:41

    What's New With SD Elements v5.6

    Watch Video
  • Attacking & Defending Containers - Part 236:52

    Attacking & Defending Containers - Part 2

    Join us for a webinar to take a deep dive into common security issues associated with Docker containers and their implications on the DevOps pipeline. We will also review the best practices for secure

    Watch Video
  • Engaging Developers to Scale Threat Modeling36:11

    Engaging Developers to Scale Threat Modeling

    Threat modeling has traditionally been executed by Security teams. The challenges, goals, motivations of Security and Engineering teams are different. Quite often, engaging Engineering on security act

    Watch Video
  • A message from Rohit4:08

    A message from Rohit

    Watch Video
  • Attacking and Defending Containers – Part 136:39

    Attacking and Defending Containers – Part 1

    Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced the containerization as part of the digital transformation. You’ll look at the

    Watch Video
  • What makes Security Compass a Great Place to Work?1:40

    What makes Security Compass a Great Place to Work?

    For the second year in a row, we were ranked among the best workplaces in Canada by the Great Place to Work Institute. Join us to meet amazing people and build your future!

    Watch Video
  • Delivering and scaling secure microservice-based products for any-cloud*54:58

    Delivering and scaling secure microservice-based products for any-cloud*

    Many large enterprises and government units prefer to run applications in private clouds, and cannot accept SaaS solutions. When catering to these markets, designing your applications for multiple, re

    Watch Video
  • loading
    Loading More...