securitycompass-logo
  • Products

    Developer-centric Threat Modeling

    Continuously model threats at scale and proactively write code that significantly reduces risks and remediation costs.

    Learn More

    About  Careers  Partners

    SD Elements

    eLearning

    Product Info

    Overview
    How It Works
    Pricing
    Features
    Content Library
    Integrations
    Just-In-Time Training

    Solutions

    Overview
    Threat Modeling
    Secure Development

    Industries

    Technology
    Manufacturing
    Financial Services & Insurance
    U.S. Federal Government

    Training

    eLearning

    eLearning Solutions
    Software Security Practitioner Program
    Course Descriptions - Secure Coding, Cloud & Compliance
  • Services

    Services

    Our services help enterprises meet compliance requirements and raise security standards. We offer eLearning courses in application security, operation security, and compliance that teach secure software development principles to development teams, in addition to general security awareness suitable for non-technical learners.

    About   Careers  Partners

    Advisory

    Security Compass Advisory is now part of Kroll. Read the press release.
    Kroll Logo
    • Overview

      We can help to strengthen your security posture and reduce risk.
    • Cloud Security Services

      Operate smoothly in the cloud while satisfying security and regulatory concerns.
    • Penetration Testing

      Streamline Your Operations with a Penetration Testing Program
    • Red Team Services

      Strengthen Your Defenses With the Full Picture
  • Resources

    Research

    Security Compass’ research team creates insights that challenge the way we think.

    Learn More

    Upcoming Events

    Join us at one of our virtual or in-person events.

    Event Calendar
    About   Careers  Partners

    Resources

    Media

    Blog
    Podcast
    SC In The News
    Videos
    Webinars

    Documents

    Case Studies
    Datasheets
    Guides & Whitepapers
    Research Reports

    eLearning

    Infographics
    Training Courses
  • About Us
  • Contact Us
  • Book Demo
  • Mobile Only
    Contact Us
    Book Demo
    Careers
    Partners

Tag: TOFU

Think Like a Recruiter to Get Your Next Job: Part 1

March 9, 2022
 |  No Comments
 |  Blog

With several talented people displaced by COVID-19, we thought about talking to our in-house recruiters to understand how they think while recruiting so that it […]

Read More →

Think Like a Recruiter to Get Your Next Job: Part 2

 |  No Comments
 |  Blog

Following our last week’s post with tips on how to get your resume picked by a recruiter, this week we want to share a few tips on […]

Read More →

Think Like a Recruiter to Get Your Next Job: Part 3

 |  No Comments
 |  Blog

This week’s post is the final part of our blog series and we are sharing tips on what makes a good interview, creating rapport with […]

Read More →

How Cybersecurity Can Enhance the Brand Image of Retailers

 |  No Comments
 |  Blog

A well-defined cybersecurity strategy can be a competitive advantage Most often organizations define the value of cybersecurity in terms of regulatory compliance, risk management, or customer […]

Read More →

The Shadow IT Problem

 |  No Comments
 |  Blog

A common issue in modern organizations is the risk introduced by shadow IT projects. Gartner estimates that 33% of enterprise attacks will come from Shadow IT by […]

Read More →

An Introduction to Enterprise Architecture and Security in Digital Transformation

 |  No Comments
 |  Blog

In today’s economy, a key business priority is the transformation of organizations to become digital. That is, a radical transformation that places the customer front […]

Read More →

How a Positive Security Culture Is a Win-Win for the Business

 |  No Comments
 |  Blog, eLearning, Training

An effective security culture ensures corporate attitudes, activities, and policies are influencing corporate behavior. All aspects of the corporation are affected, be it physical, operational, […]

Read More →

Why Businesses Need to Go Fast and Stay Safe

 |  No Comments
 |  Blog

Today’s world is fast-moving.  Organizations need to be innovating fast; having what their customers want before they even know they want it – or risk […]

Read More →

Cybersecurity and Insurance: Why Hackers Target Insurance Companies

 |  No Comments
 |  Blog

Malicious hackers may be criminals, but they are also rational.  They want to steal data that has a lot of value and large numbers.  Attacks […]

Read More →

Engineering Privacy into Software

 |  No Comments
 |  Blog, eLearning, Training

The movement towards individual privacy protection has been driven by a public awareness that was slow to appreciate the risks of unprotected data.  As collective […]

Read More →

Posts navigation

Back 1 2 3 4 … 13 Next

Topics

  • Application Security
  • Application Security – Fundamentals
  • Application Security – Secure Coding
  • Application Security – Secure Mobile
  • Authority to Operate
  • Blog
  • CIO
  • CISO
  • Compliance
  • Curriculum
  • DevSecOps
  • eLearning
  • Financial Services
  • General Awareness
  • Government
  • Insurance
  • Manufacturing
  • Operational Security
  • Product Updates
  • Reports
  • Risk Assessment
  • Secure Development
  • Security Analyst
  • Security Awareness
  • Software Developer
  • Technology
  • Threat Modeling
  • Training

ABOUT US

CAREERS

PARTNERS

RESEARCH

SUPPORT

TRAINING SUPPORT

SD ELEMENTS

SD ELEMENTS

Product Info

  • Overview
  • How It Works
  • Content Library
  • Integrations
  • Just-In-Time Training
  • Features

Solutions

  • Use Case Overview
  • Threat Modeling
  • Secure Development

Industries

  • Manufacturing
  • Technology
  • U.S. Federal Government
  • Financial Services

eLearning

  • eLearning Solutions
  • Software Security Practitioner (SSP) Program
  • Course Descriptions - Secure Coding, Cloud & Compliance

ADVISORY

  • Overview
  • Cloud Security Services
  • Penetration Testing
  • Red Team Services

RESOURCES

  • Application Security
  • Authority to Operate (ATO)
  • Secure Development
  • Security Awareness
  • Threat Modeling
Sign-up for our newsletter
Facebook Linkedin Twitter Instagram Youtube
Copyright © 2023 Security Compass. All Rights Reserved.
  • Public Vulnerability Disclosure
  • Accessibility
  • Privacy Policy
  • Legal