securitycompass-logo
  • Products

    Developer-centric Threat Modeling

    Continuously model threats at scale and proactively write code that significantly reduces risks and remediation costs.

    Learn More

    About  Careers  Partners

    SD Elements

    Training

    Product Info

    Overview
    How It Works
    Pricing
    Features
    Content Library
    Integrations
    DevSecOps Services
    Just-In-Time Training

    Solutions

    Overview
    Threat Modeling
    Secure Development

    Industries

    Technology
    Manufacturing
    Financial Services & Insurance
    U.S. Federal Government

    Training

    ELEARNING

    Enterprise
    Software Security Practitioner Suites
    Virtual Lab
    Course Descriptions
  • Services

    Services

    Our services help enterprises meet compliance requirements and raise security standards. We offer eLearning courses in application security, operation security, and compliance that teach secure software development principles to development teams, in addition to general security awareness suitable for non-technical learners.

    About   Careers  Partners

    Advisory

    Security Compass Advisory is now part of Kroll. Read the press release.
    Kroll Logo
    • Overview

      We can help to strengthen your security posture and reduce risk.
    • Cloud Security Services

      Operate smoothly in the cloud while satisfying security and regulatory concerns.
    • Penetration Testing

      Streamline Your Operations with a Penetration Testing Program
    • Red Team Services

      Strengthen Your Defenses With the Full Picture
  • Resources

    Research

    Security Compass’ research team creates insights that challenge the way we think.

    Learn More

    Upcoming Events

    Join us at one of our virtual or in-person events.

    Event Calendar
    About   Careers  Partners

    Resources

    Media

    Blog
    Podcast
    SC In The News
    Videos
    Webinars

    Documents

    Case Studies
    Datasheets
    Guides & Whitepapers
    Research Reports

    Educational

    Infographics
    Training Courses
  • Careers
  • Contact Us
  • Book Demo
  • Mobile Only
    Contact Us
    Book Demo
    About
    Careers
    Partners

Category: Category: Blog

Scale Your Threat Modeling Program with New SD Elements Capabilities

June 24, 2022
 |  No Comments
 |  Blog

Building secure software necessitates a holistic approach to security, which includes bringing “secure by design” principles to life. The industry recognizes the benefits of performing […]

Read More →

Quantifying Reduced Costs Due to Automation with SD Elements

May 27, 2022
 |  No Comments
 |  Blog

Author: Trevor Young, Security Compass Chief Product Officer In an earlier blog post, we explained why Security Compass commissioned Forrester Consulting to conduct a study […]

Read More →

Quantifying Increased Productivity with SD Elements

May 9, 2022
 |  No Comments
 |  Blog

Application security and software development teams know they need to mature their application security program so they can more proactively identify software security threats and […]

Read More →

Measuring the Economic Impact of SD Elements: A New Research Study

April 19, 2022
 |  No Comments
 |  Blog

Companies of all sizes face increased pressure to start or mature their application security programs. Determining how to do so can be confusing, especially with […]

Read More →

10 Proven Best Practices for Secure API Development

April 13, 2022
 |  No Comments
 |  Blog

In the past, most applications were monolithic with self-contained logic and operational functionality. Modern applications are more likely to be built from dozens or hundreds […]

Read More →

Microservices and What You Need to Know About Their Security

April 4, 2022
 |  No Comments
 |  Blog

In the past, building an application meant just that: a single, monolithic application built by a single team. When the application was updated, any change […]

Read More →

Understanding Threat Modeling and Executive Order 14028

March 30, 2022
 |  No Comments
 |  Blog

In May, 2021, the Biden Administration issued Executive Order (EO) 14028, “Improving the Nation’s Cybersecurity.” Included in the EO is the requirement that “the Federal Government […]

Read More →

How to Best Threat Model Cloud-Native Applications

March 22, 2022
 |  No Comments
 |  Blog

Organizations of all sizes are accelerating their move to the cloud. The benefits of instant upward or downward scalability are obvious. As is the avoidance […]

Read More →

Why You Need to Create an Effective Security Champion Program

March 15, 2022
 |  No Comments
 |  Blog

Who Is a Security Champion? As your organization seeks to protect itself against security threats, the importance of a strong security culture cannot be overstated. […]

Read More →

Three Important Steps to Launching a Successful Security Training Program

March 14, 2022
 |  No Comments
 |  Blog

Why Security Training Matters When we talk about training, our goal is to align the intrinsic motivations of a learner with the company’s strategy and […]

Read More →

Posts navigation

1 2 … 19 Next

Topics

  • Application Security
  • Authority to Operate
  • Blog
  • CIO
  • CISO
  • DevSecOps
  • Financial Services
  • Government
  • Insurance
  • Manufacturing
  • Risk Assessment
  • Secure Development
  • Security Analyst
  • Security Awareness
  • Software Developer
  • Technology
  • Threat Modeling

ABOUT US

CAREERS

PARTNERS

RESEARCH

SDE SUPPORT

TRAINING SUPPORT

SD ELEMENTS

SD ELEMENTS

Product Info

  • Overview
  • How It Works
  • Content Library
  • Integrations
  • Just-In-Time Training
  • Features
  • DevSecOps Services

Solutions

  • Use Case Overview
  • Threat Modeling
  • Secure Development

Industries

  • Manufacturing
  • Technology
  • U.S. Federal Government
  • Financial Services

TRAINING

  • Enterprise
  • Virtual Lab
  • Software Security Practitioner (SSP) Suites
  • Course Descriptions

ADVISORY

  • Overview
  • Cloud Security Services
  • Penetration Testing
  • Red Team Services

RESOURCES

  • LOG4J2 Information
  • Threat Modeling
  • Secure Development
  • Authority to Operate (ATO)
  • Security Awareness
  • Application Security
Facebook Linkedin Twitter Instagram

Copyright © 2022 Security Compass. All Rights Reserved.

  • Public Vulnerability Disclosure
  • Accessibility
  • Privacy Policy
  • Legal