securitycompass-logo
  • Products

    Developer-centric Threat Modeling

    Continuously model threats at scale and proactively write code that significantly reduces risks and remediation costs.

    Learn More

    About  Careers  Partners

    SD Elements

    Training

    Product Info

    Overview
    How It Works
    Pricing
    Features
    Content Library
    Integrations
    DevSecOps Services
    Just-In-Time Training

    Solutions

    Overview
    Threat Modeling
    Secure Development

    Industries

    Technology
    Manufacturing
    Financial Services & Insurance
    U.S. Federal Government

    Training

    ELEARNING

    Enterprise
    Software Security Practitioner Suites
    Virtual Lab
    Course Descriptions
  • Services

    Services

    Our services help enterprises meet compliance requirements and raise security standards. We offer eLearning courses in application security, operation security, and compliance that teach secure software development principles to development teams, in addition to general security awareness suitable for non-technical learners.

    About   Careers  Partners

    Advisory

    Security Compass Advisory is now part of Kroll. Read the press release.
    Kroll Logo
    • Overview

      We can help to strengthen your security posture and reduce risk.
    • Cloud Security Services

      Operate smoothly in the cloud while satisfying security and regulatory concerns.
    • Penetration Testing

      Streamline Your Operations with a Penetration Testing Program
    • Red Team Services

      Strengthen Your Defenses With the Full Picture
  • Resources

    Research

    Security Compass’ research team creates insights that challenge the way we think.

    Learn More

    Upcoming Events

    Join us at one of our virtual or in-person events.

    Event Calendar
    About   Careers  Partners

    Resources

    Media

    Blog
    Podcast
    SC In The News
    Videos
    Webinars

    Documents

    Case Studies
    Datasheets
    Guides & Whitepapers
    Research Reports

    Educational

    Infographics
    Training Courses
  • Careers
  • Contact Us
  • Book Demo
  • Mobile Only
    Contact Us
    Book Demo
    About
    Careers
    Partners

Tag: CIO

What is DevSecOps and How Can You Start or Mature A Program?

March 11, 2022
 |  No Comments
 |  Blog

Mid-market organizations face the same security, regulatory, and compliance requirements as their larger peers without the same resources. Security resources are scarce. Synopsys’ BSIMM12 report found that […]

Read More →

Three Steps to Effective Security Training For Your Organization

February 14, 2022
 |  No Comments
 |  Blog

Regulations and Standards Demand Robust Training When we talk about security training, we tend to think of regulations and compliance. In other words, we have […]

Read More →

How to Avoid the OWASP Top 10 List of Software Vulnerabilities and Risks

February 7, 2022
 |  No Comments
 |  Blog

The Open Web Application Security Project (OWASP) is a non-profit organization that works to improve the security of software applications with tools and resources, education, […]

Read More →

How to Automate Threat Modeling to Save Time and Money, and Mitigate Risk

February 3, 2022
 |  No Comments
 |  Blog

Automate Threat Modeling to Mitigate Cyber Risks at Scale Cyberattacks on organizations continue to increase. According to Accenture’s State of Cybersecurity Resilience 2021 Report, the average […]

Read More →

Security Compass Releases Research Report: 2021 Year in Review

January 24, 2022
 |  No Comments
 |  Blog

Security Compass is pleased to share our latest research report, 2021 Year in Review. The report compiles the results of four primary research studies, commissioned by […]

Read More →

What is Threat Modeling?

January 19, 2022
 |  No Comments
 |  Blog

Threat modeling is a proactive process that identifies potential attacks to an important asset so mitigations can be developed prior to any negative impact. What are […]

Read More →

Cloud Computing Trends: The State of Cloud Adoption in 2021

September 7, 2021
 |  No Comments
 |  Blog

Is security the reason for growth in cloud applications or the barrier to its adoption?  Both may be true. Cloud usage among enterprises continues its […]

Read More →

Survey: The 2021 State of DevSecOps

February 9, 2021
 |  No Comments
 |  Blog

As featured in: Daily Briefing > V10 Issue 26 February 9, 2021 The CyberWire John Petrik About Security Compass Security Compass, a leading provider of cybersecurity […]

Read More →

The 2021 State of DevSecOps: Challenges and Drivers

 |  No Comments
 |  Blog

Over the last decade, there have been many attempts to adopt DevSecOps across organizations. Unfortunately, because of the differences in priorities, DevOps and security teams […]

Read More →

Using Developer-centric Threat Modeling to Achieve Both Speed and Security for CMMC

January 5, 2021
 |  No Comments
 |  Blog

With the introduction of the Cybersecurity Maturity Model Certification (CMMC) in the U.S. as a means of unifying cybersecurity standards for the Department of Defense, […]

Read More →

Posts navigation

1 2 Next

Topics

  • Application Security
  • Authority to Operate
  • Blog
  • CIO
  • CISO
  • DevSecOps
  • Financial Services
  • Government
  • Insurance
  • Manufacturing
  • Risk Assessment
  • Secure Development
  • Security Analyst
  • Security Awareness
  • Software Developer
  • Technology
  • Threat Modeling

ABOUT US

CAREERS

PARTNERS

RESEARCH

SDE SUPPORT

TRAINING SUPPORT

SD ELEMENTS

SD ELEMENTS

Product Info

  • Overview
  • How It Works
  • Content Library
  • Integrations
  • Just-In-Time Training
  • Features
  • DevSecOps Services

Solutions

  • Use Case Overview
  • Threat Modeling
  • Secure Development

Industries

  • Manufacturing
  • Technology
  • U.S. Federal Government
  • Financial Services

TRAINING

  • Enterprise
  • Virtual Lab
  • Software Security Practitioner (SSP) Suites
  • Course Descriptions

ADVISORY

  • Overview
  • Cloud Security Services
  • Penetration Testing
  • Red Team Services

RESOURCES

  • LOG4J2 Information
  • Threat Modeling
  • Secure Development
  • Authority to Operate (ATO)
  • Security Awareness
  • Application Security
Facebook Linkedin Twitter Instagram

Copyright © 2022 Security Compass. All Rights Reserved.

  • Public Vulnerability Disclosure
  • Accessibility
  • Privacy Policy
  • Legal