ISO 27001 and the Evolution of Secure Coding
ISO 27001 is a globally recognized international standard that offers a systematic approach to managing information security. When used with its guidance document, ISO 27002, […]
Read More →🔥 Upcoming Webinar: The ROI for Security by Design – March 26th | 2pm EST
Security Compass’ research team creates insights that challenge the way we think.
Join us at one of our virtual or in-person events.
ISO 27001 is a globally recognized international standard that offers a systematic approach to managing information security. When used with its guidance document, ISO 27002, […]
Read More →Mid-market organizations face the same security, regulatory, and compliance requirements as their larger peers without the same resources. Security resources are scarce. Synopsys’ BSIMM12 report found that […]
Read More →An effective security culture ensures corporate attitudes, activities, and policies are influencing corporate behavior. All aspects of the corporation are affected, be it physical, operational, […]
Read More →The Open Web Application Security Project (OWASP) is a non-profit organization that works to improve the security of software applications with tools and resources, education, […]
Read More →Understanding Gamification Gamification is one of the most effective ways to engage and motivate learners. It allows learners to engage with training material through techniques […]
Read More →Security Compass is pleased to share our latest research report, 2021 Year in Review. The report compiles the results of four primary research studies, commissioned by […]
Read More →Threat modeling is a proactive process that identifies potential attacks to an important asset so mitigations can be developed prior to any negative impact. Building […]
Read More →The Publish-Subscribe messaging pattern is a solution to message dissemination and delivery problems. Instead of directly transmitting a message to an end receiver (e.g. the […]
Read More →Is security the reason for growth in cloud applications or the barrier to its adoption? Both may be true. Cloud usage among enterprises continues its […]
Read More →Most organizations use the OWASP Top 10 as the standard against which they test for security vulnerabilities in their web applications. The OWASP Top 10 includes the […]
Read More →