🔥 Subscribe to Our Monthly Security Digest Newsletter
Sign Me Up
👉 Register for The Security by Design Webinar Series
Sign Me Up
🔥 Subscribe to Our Monthly Security Digest Newsletter
Sign Me Up

👉 Register for The Security by Design Webinar Series
Sign Me Up

  • Products

    Developer-Centric Threat Modeling

    Continuously model threats at scale and proactively write code that significantly reduces risks and remediation costs.

    Developer-Centric
    Threat Modeling

    Continuously model threats at scale and proactively write code that significantly reduces risks and remediation costs.

    Learn More
    About  Careers  Partners

       SD Elements

       Training

    Product Info

    Overview
    How It Works
    Pricing
    Features
    Content Library
    Integrations
    Just-In-Time Training
    Support

    Solutions

    Overview
    Secure Development
    Threat Modeling

    Industries

    Technology
    Manufacturing
    Financial Services & Insurance
    U.S. Federal Government

    Training

    Application Security Training
    Software Security Practitioner Program
    Course Descriptions
  • Resources

     Research

    Security Compass’ research team creates insights that challenge the way we think.

    Learn More

     Upcoming Events

    Join us at one of our virtual or in-person events.

    Event Calendar
    About   Careers  Partners

       Resources

    Media

    Blog
    Podcast
    SC In The News
    Videos
    Webinars

    Documents

    Case Studies
    Datasheets
    Guides & Whitepapers
    Research Reports

    Application Security Training

    Infographics
    Training Courses
    Training Curriculum
  • Equilibrium 2023
  • About Us
  • Contact Us
  • Product Tours
  • Book Demo
  • Mobile Only
    Contact Us
    Book Demo
    Book Demo
    Product Tour
    About
    Careers
    Partners

Tag: DevOps

What is DevSecOps and How Can You Start or Mature A Program?

March 11, 2022
 |  No Comments
 |  Blog

Mid-market organizations face the same security, regulatory, and compliance requirements as their larger peers without the same resources. Security resources are scarce. Synopsys’ BSIMM12 report found that […]

Read More →

Enabling Governance in DevOps: the myth of security as a disruptor

March 9, 2022
 |  No Comments
 |  Blog

Businesses today have enormous sets of policies to comply with and no way to translate those policies to their operations. The problem is that there […]

Read More →

Overcoming Challenges: Solutions for DevSecOps Implementation

 |  No Comments
 |  Blog

The question of whether to implement DevSecOps in your organization is no longer a matter of if — it’s a matter of when. DevSecOps brings harmony to the […]

Read More →

Integration of Security Practices in a DevOps Environment

 |  No Comments
 |  Blog

Authors: Ken Malmquist, Senior Director of Research and Development, Moss Adams Altaz Valani, Research Director, Security Compass Current challenges Application security is a vital part […]

Read More →

A World with Security-Minded Developers: What Will It Take?

 |  No Comments
 |  Blog

Author: Pranoy De, Solutions Engineer at Security Compass In the last couple of years, we have witnessed large data breaches, including Marriott, Equifax, and Facebook, making […]

Read More →

Operational Security – SD Elements Expands its Support

 |  No Comments
 |  Blog

As more teams have transitioned to agile development, a new culture has spawned, popularly known as DevOps. This term describes a modern technical environment, wherein the […]

Read More →

SD Elements V4 – Raising the bar for Application Security in Software Development

 |  No Comments
 |  Blog

Newly-Architected SD Elements 4 Delivers Tiered Offerings, Integrated Training and Greater Usability and Performance. Savvy security professionals know that security must be addressed from the […]

Read More →

ASRTM Helps Businesses Turn Security Policies into Actionable Procedures

November 28, 2017
 |  No Comments
 |  Blog

Within a DevOps context, there is a governance gap between the business, security teams, and compliance teams. In this context, governance should entail establishing the […]

Read More →

Building Security In: SD Elements Extends its Coverage of DevOps with Software Operational Security

October 31, 2017
 |  No Comments
 |  Blog

DevOps is a cultural and technical shift that integrates development with operations and security, and it has changed how developers build, test, deploy, and maintain […]

Read More →

Clearing Up Common Misconceptions of CI/CD For Supporting Teams

July 19, 2017
 |  No Comments
 |  Blog

By Ehsan Foroughi Success of a CI/CD (Continuous Integration and Continuous Delivery) process in an enterprise environment relies heavily on teams supporting the development process. A particularly important […]

Read More →

Posts navigation

1 2 Next

Topics

  • Application Security
  • Application Security – Fundamentals
  • Application Security – Secure Coding
  • Application Security – Secure Mobile
  • Application Security Training
  • Authority to Operate
  • Blog
  • CIO
  • CISO
  • Compliance
  • Curriculum
  • DevSecOps
  • Financial Services
  • General Awareness
  • Government
  • Insurance
  • Manufacturing
  • Operational Security
  • Product Updates
  • Reports
  • Risk Assessment
  • Secure Development
  • Security Analyst
  • Security Awareness
  • Software Developer
  • Technology
  • Threat Modeling
  • Training

CONTACT US

ABOUT US

CAREERS

PARTNERS

RESEARCH

SUPPORT

TRAINING SUPPORT

SD ELEMENTS

SD ELEMENTS

Product Info

  • Overview
  • How It Works
  • Content Library
  • Integrations
  • Just-In-Time Training
  • Features

Solutions

  • Use Case Overview
  • Threat Modeling
  • Secure Development

Industries

  • Manufacturing
  • Technology
  • U.S. Federal Government
  • Financial Services

Application Security Training

  • Application Security Training
  • Software Security Practitioner (SSP) Program
  • Course Descriptions

ADVISORY

  • Overview
  • Cloud Security Services
  • Penetration Testing
  • Red Team Services

RESOURCES

  • Application Security
  • Authority to Operate (ATO)
  • Secure Development
  • Security Awareness
  • Threat Modeling
Sign-up for our newsletter
Facebook Linkedin Twitter Instagram Youtube
Copyright © 2023 Security Compass. All Rights Reserved.
  • Public Vulnerability Disclosure
  • Accessibility
  • Privacy Policy
  • Legal