🔥 Subscribe to Our Monthly Security Digest Newsletter
Sign Me Up
👉 Register for The Security by Design Webinar Series
Sign Me Up
🔥 Subscribe to Our Monthly Security Digest Newsletter
Sign Me Up

👉 Register for The Security by Design Webinar Series
Sign Me Up

  • Products

    Developer-Centric Threat Modeling

    Continuously model threats at scale and proactively write code that significantly reduces risks and remediation costs.

    Developer-Centric
    Threat Modeling

    Continuously model threats at scale and proactively write code that significantly reduces risks and remediation costs.

    Learn More
    About  Careers  Partners

       SD Elements

       Training

    Product Info

    Overview
    How It Works
    Pricing
    Features
    Content Library
    Integrations
    Just-In-Time Training
    Support

    Solutions

    Overview
    Threat Modeling
    Secure Development

    Industries

    Technology
    Manufacturing
    Financial Services & Insurance
    U.S. Federal Government

    Training

    Application Security Training
    Software Security Practitioner Program
    Course Descriptions
  • Resources

     Research

    Security Compass’ research team creates insights that challenge the way we think.

    Learn More

     Upcoming Events

    Join us at one of our virtual or in-person events.

    Event Calendar
    About   Careers  Partners

       Resources

    Media

    Blog
    Podcast
    SC In The News
    Videos
    Webinars

    Documents

    Case Studies
    Datasheets
    Guides & Whitepapers
    Research Reports

    Application Security Training

    Infographics
    Training Courses
    Training Curriculum
  • Equilibrium 2023
  • About Us
  • Contact Us
  • Book Demo
  • Mobile Only
    Contact Us
    Book Demo
    Book Demo
    Product Tour
    About
    Careers
    Partners

Tag: Authority to Operate

Understanding Threat Modeling and Executive Order 14028

March 30, 2022
 |  No Comments
 |  Authority to Operate, Blog, Government

In May, 2021, the Biden Administration issued Executive Order (EO) 14028, “Improving the Nation’s Cybersecurity.” Included in the EO is the requirement that “the Federal Government […]

Read More →

Expert Advice on How to Attain Authority to Operate (ATO) Faster

February 14, 2022
 |  No Comments
 |  Authority to Operate, Blog, Government

The software development and IT organizations within U.S. federal government agencies face conflicting challenges. They must defend  systems against constant attacks by criminals, hacktivists, and […]

Read More →

Security Compass Releases Research Report: 2021 Year in Review

January 24, 2022
 |  No Comments
 |  Blog

Security Compass is pleased to share our latest research report, 2021 Year in Review. The report compiles the results of four primary research studies, commissioned by […]

Read More →

Research Study Results: US Government Agencies Face Numerous Challenges Balancing Software Security & Time to Market Demands

October 4, 2021
 |  No Comments
 |  Blog

The last 18 months have been among the most challenging times to develop and deploy software for federal, state and local government agencies.   Before COVID-19, […]

Read More →

U.S. Federal Government Agencies: SD Elements Embeds Cybersecurity Training Into DevSecOps

June 3, 2021
 |  No Comments
 |  Application Security Training, Authority to Operate, Blog, Government, Training

Cybersecurity training programs for developers help build a culture of security in your organization as well as raise awareness about secure coding best practices. However, […]

Read More →

NIST 800-53 Revision 5: Preparing for Transition and Ensuring Compliance

April 28, 2021
 |  No Comments
 |  Application Security Training, Authority to Operate, Blog, Government, Training

After years of anticipation, Revision 5 (Rev 5) of National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, “Security and Privacy Controls for Information Systems […]

Read More →

SD Elements Meets the U.S. DoD Iron Bank Security Requirements

March 23, 2021
 |  No Comments
 |  Application Security Training, Blog, Training

SD Elements is now available in the U.S. Department of Defense (DoD) Platform One Iron Bank repository which contains authorized container images hardened to the department’s […]

Read More →

Using Developer-centric Threat Modeling to Achieve Both Speed and Security for CMMC

January 5, 2021
 |  No Comments
 |  Authority to Operate, Blog

With the introduction of the Cybersecurity Maturity Model Certification (CMMC) in the U.S. as a means of unifying cybersecurity standards for the Department of Defense, […]

Read More →

U.S. Federal Government: Scaling DevSecOps for Secure Application Development

June 3, 2020
 |  No Comments
 |  Authority to Operate, Blog, Government

Managing rapid application delivery with secure development has long been a major challenge for U.S. federal government agencies. Part of the reason was the constant […]

Read More →

FedRAMP and Authority to Operate (ATO) – Driving Business

November 29, 2019
 |  No Comments
 |  Application Security Training, Authority to Operate, Blog, Government, Training

The Federal Risk and Authorization Management Program (FedRAMP) is a US government-wide “cloud policy” first issued in February 2011. For a cloud service provider (CSP), or cloud […]

Read More →

Topics

  • Application Security
  • Application Security – Fundamentals
  • Application Security – Secure Coding
  • Application Security – Secure Mobile
  • Application Security Training
  • Authority to Operate
  • Blog
  • CIO
  • CISO
  • Compliance
  • Curriculum
  • DevSecOps
  • Financial Services
  • General Awareness
  • Government
  • Insurance
  • Manufacturing
  • Operational Security
  • Product Updates
  • Reports
  • Risk Assessment
  • Secure Development
  • Security Analyst
  • Security Awareness
  • Software Developer
  • Technology
  • Threat Modeling
  • Training

ABOUT US

CAREERS

PARTNERS

RESEARCH

SUPPORT

TRAINING SUPPORT

SD ELEMENTS

SD ELEMENTS

Product Info

  • Overview
  • How It Works
  • Content Library
  • Integrations
  • Just-In-Time Training
  • Features

Solutions

  • Use Case Overview
  • Threat Modeling
  • Secure Development

Industries

  • Manufacturing
  • Technology
  • U.S. Federal Government
  • Financial Services

Application Security Training

  • Application Security Training
  • Software Security Practitioner (SSP) Program
  • Course Descriptions

ADVISORY

  • Overview
  • Cloud Security Services
  • Penetration Testing
  • Red Team Services

RESOURCES

  • Application Security
  • Authority to Operate (ATO)
  • Secure Development
  • Security Awareness
  • Threat Modeling
Sign-up for our newsletter
Facebook Linkedin Twitter Instagram Youtube
Copyright © 2023 Security Compass. All Rights Reserved.
  • Public Vulnerability Disclosure
  • Accessibility
  • Privacy Policy
  • Legal