securitycompass-logo
  • Products

    Balanced Development Automation

    Designed to automate your risk and compliance requirements, BDA ensures you can develop secure code as quickly as possible, without compromising on safety.

    Learn More

    About  Careers  Partners

    SD Elements

    Training

    Product Info

    Overview
    How It Works
    Pricing
    Features
    Content Library
    Integrations
    DevSecOps Services
    Just-In-Time Training

    Solutions

    Overview
    Threat Modeling
    Secure Development

    Industries

    Technology
    Manufacturing
    Financial Services & Insurance
    U.S. Federal Government

    Training

    ELEARNING

    Enterprise
    Software Security Practitioner Suites
    Virtual Lab
    Course Descriptions
  • Services

    Services

    Our services help enterprises meet compliance requirements and raise security standards. We offer eLearning courses in application security, operation security, and compliance that teach secure software development principles to development teams, in addition to general security awareness suitable for non-technical learners.

    About   Careers  Partners

    Advisory

    Security Compass Advisory is now part of Kroll. Read the press release.
    Kroll Logo
    • Overview

      We can help to strengthen your security posture and reduce risk.
    • Cloud Security Services

      Operate smoothly in the cloud while satisfying security and regulatory concerns.
    • Penetration Testing

      Streamline Your Operations with a Penetration Testing Program
    • Red Team Services

      Strengthen Your Defenses With the Full Picture
  • Resources

    Research

    Security Compass’ research team creates insights that challenge the way we think.

    Learn More
    About   Careers  Partners

    Resources

    Media

    Blog
    Podcast
    Webinars
    SC In The News

    Documents

    Case Studies
    Guides & Whitepapers
    Datasheets
    Research Reports

    Educational

    Infographics
    Training Courses
  • Careers
  • Contact Us
  • Book Demo
  • Mobile Only
    Contact Us
    Book Demo
    About
    Careers
    Partners

Category: Category: Secure Development

What to Look for in a Penetration Testing Provider

March 10, 2022
 |  No Comments
 |  Secure Development

Finding the right penetration testing partner is critical. A third-party penetration tester can serve as a new set of eyes. They can give an unbiased […]

Read More →

Responding to Ryuk: Healthcare and the Ransomware Threat

 |  No Comments
 |  Secure Development

Responding to Ryuk: Healthcare and the Ransomware Threat Through the second half of 2020, multiple health and hospital systems fell victim to Ryuk ransomware attacks. Affected hospitals […]

Read More →

Using Balanced Development Automation to Achieve Both Speed and Security for CMMC

 |  No Comments
 |  Authority to Operate, Secure Development

With the introduction of the Cybersecurity Maturity Model Certification (CMMC) in the U.S. as a means of unifying cybersecurity standards for the Department of Defense, organizations must […]

Read More →

The Future of Cybersecurity: Five Emerging Trends

 |  No Comments
 |  Secure Development

Security leaders have had a fraught past year. 2020 upended security strategies and IT roadmaps. The secure legacy perimeter of the physical office disappeared. And […]

Read More →

Cloud versus Traditional Security: Protecting Your Data & Systems

 |  No Comments
 |  Secure Development

The cloud is the future of business and offers limitless opportunities to optimize operations while minimizing capital expenditures. As part of its flexibility and scalability […]

Read More →

How to Build Custom Red Team Testing Tools in C++

 |  No Comments
 |  Secure Development

For red team practitioners looking to enhance their skills, or software developers interested in learning more about how Command and Control (C2) frameworks function, Security […]

Read More →

TimeGap Theory: Testing for TOCTOU Issues in Web Applications

 |  No Comments
 |  Secure Development

How much do you, your developers, and your security team know about TOCTOU vulnerabilities in web applications? After listening to my conversation with Abhi Balakrishnan, […]

Read More →

Secure Your Software Build Operations

 |  No Comments
 |  Secure Development

Secure your business by securing your build operations The SolarWinds attack has dominated information security news since December, when both private firms and government agencies […]

Read More →

SD Elements Meets the U.S. DoD Iron Bank Security Requirements

 |  No Comments
 |  Authority to Operate, Secure Development

SD Elements, the industry’s first Balanced Development Automation (BDA) platform, is now available in the U.S. Department of Defense (DoD) Platform One Iron Bank repository which contains […]

Read More →

Agile Penetration Testing: A Continuous Approach that Won’t Slow You Down

 |  No Comments
 |  Secure Development

As a product manager, I’ve worked with many companies who made the move to Agile methodologies to develop and release software. Agile offers businesses a […]

Read More →

Posts navigation

1 2 … 17 Next

Topics

  • Application Security
  • Authority to Operate
  • CIO
  • CISO
  • Financial Services
  • Government
  • Insurance
  • Manufacturing
  • Risk Assessment
  • Secure Development
  • Security Analyst
  • Security Awareness
  • Software Developer
  • Technology
  • Threat Modeling

ABOUT US

CAREERS

PARTNERS

RESEARCH

SDE SUPPORT

TRAINING SUPPORT

SD ELEMENTS

SD ELEMENTS

Product Info

  • Overview
  • How It Works
  • Content Library
  • Integrations
  • Just-In-Time Training
  • Features
  • DevSecOps Services

Solutions

  • Use Case Overview
  • Threat Modeling
  • Secure Development

Industries

  • Manufacturing
  • Technology
  • U.S. Federal Government
  • Financial Services

TRAINING

  • Enterprise
  • Virtual Lab
  • Software Security Practitioner (SSP) Suites
  • Course Descriptions

ADVISORY

  • Overview
  • Cloud Security Services
  • Penetration Testing
  • Red Team Services

RESOURCES

  • LOG4J2 Information
  • Threat Modeling
  • Secure Development
  • Authority to Operate (ATO)
  • Security Awareness
  • Application Security
Facebook Linkedin Twitter Instagram

Copyright © 2022 Security Compass. All Rights Reserved.

  • Public Vulnerability Disclosure
  • Accessibility
  • Privacy Policy
  • Legal