securitycompass-logo
  • Products

    Developer-centric Threat Modeling

    Continuously model threats at scale and proactively write code that significantly reduces risks and remediation costs.

    Learn More

    About  Careers  Partners

    SD Elements

    eLearning

    Product Info

    Overview
    How It Works
    Pricing
    Features
    Content Library
    Integrations
    Just-In-Time Training

    Solutions

    Overview
    Threat Modeling
    Secure Development

    Industries

    Technology
    Manufacturing
    Financial Services & Insurance
    U.S. Federal Government

    Training

    eLearning

    eLearning Solutions
    Software Security Practitioner Program
    Course Descriptions - Secure Coding, Cloud & Compliance
  • Services

    Services

    Our services help enterprises meet compliance requirements and raise security standards. We offer eLearning courses in application security, operation security, and compliance that teach secure software development principles to development teams, in addition to general security awareness suitable for non-technical learners.

    About   Careers  Partners

    Advisory

    Security Compass Advisory is now part of Kroll. Read the press release.
    Kroll Logo
    • Overview

      We can help to strengthen your security posture and reduce risk.
    • Cloud Security Services

      Operate smoothly in the cloud while satisfying security and regulatory concerns.
    • Penetration Testing

      Streamline Your Operations with a Penetration Testing Program
    • Red Team Services

      Strengthen Your Defenses With the Full Picture
  • Resources

    Research

    Security Compass’ research team creates insights that challenge the way we think.

    Learn More

    Upcoming Events

    Join us at one of our virtual or in-person events.

    Event Calendar
    About   Careers  Partners

    Resources

    Media

    Blog
    Podcast
    SC In The News
    Videos
    Webinars

    Documents

    Case Studies
    Datasheets
    Guides & Whitepapers
    Research Reports

    eLearning

    Infographics
    Training Courses
  • About Us
  • Contact Us
  • Book Demo
  • Mobile Only
    Contact Us
    Book Demo
    Careers
    Partners

Tag: TOFU

Enabling Governance in DevOps: the myth of security as a disruptor

March 9, 2022
 |  No Comments
 |  Blog

Businesses today have enormous sets of policies to comply with and no way to translate those policies to their operations. The problem is that there […]

Read More →

Overcoming Challenges: Solutions for DevSecOps Implementation

 |  No Comments
 |  Blog

The question of whether to implement DevSecOps in your organization is no longer a matter of if — it’s a matter of when. DevSecOps brings harmony to the […]

Read More →

Integration of Security Practices in a DevOps Environment

 |  No Comments
 |  Blog

Authors: Ken Malmquist, Senior Director of Research and Development, Moss Adams Altaz Valani, Research Director, Security Compass Current challenges Application security is a vital part […]

Read More →

An Introduction to California’s Upcoming IoT Regulations

 |  No Comments
 |  Blog

As Internet of Things (IoT) devices continue to grow in popularity, new cybersecurity standards and regulations will be needed to protect users’ information. Recently, California […]

Read More →

A Primer on Security in the Industrial IoT Space

 |  No Comments
 |  Blog

The Internet of Things (IoT) has changed the way we connect with the world. From wearables and accessories to speakers and thermostats, these devices connect […]

Read More →

Shifting the Paradigm for Connected Car Security

 |  No Comments
 |  Blog

Authors Nathanael Mohammed, Technical Writer, Security Compass Shahrear Iqbal, Security Researcher, National Research Council Canada   Modern vehicles contain more technology and more lines of code than […]

Read More →

Women in Security

 |  No Comments
 |  Blog

Cybersecurity is a diverse field, ranging from privacy and information to application and network security. As we rely more on software and the Internet in […]

Read More →

Top Cyber Threats and Trends to Look Out For in 2019

 |  No Comments
 |  Blog

Despite the development and deployment of sophisticated cyber security solutions, patches, and updates, there has been a continuous increase in the number of cyber attacks. […]

Read More →

A World with Security-Minded Developers: What Will It Take?

 |  No Comments
 |  Blog

Author: Pranoy De, Solutions Engineer at Security Compass In the last couple of years, we have witnessed large data breaches, including Marriott, Equifax, and Facebook, making […]

Read More →

Building Secure And Compliant Applications For Connected Vehicles

 |  No Comments
 |  Blog

In today’s connected environment, people expect a seamless experience using all of their devices, including vehicles. As a result, vehicles are becoming increasingly connected to […]

Read More →

Posts navigation

Back 1 2 3 4 5 … 13 Next

Topics

  • Application Security
  • Application Security – Fundamentals
  • Application Security – Secure Coding
  • Application Security – Secure Mobile
  • Authority to Operate
  • Blog
  • CIO
  • CISO
  • Compliance
  • Curriculum
  • DevSecOps
  • eLearning
  • Financial Services
  • General Awareness
  • Government
  • Insurance
  • Manufacturing
  • Operational Security
  • Product Updates
  • Reports
  • Risk Assessment
  • Secure Development
  • Security Analyst
  • Security Awareness
  • Software Developer
  • Technology
  • Threat Modeling
  • Training

ABOUT US

CAREERS

PARTNERS

RESEARCH

SUPPORT

TRAINING SUPPORT

SD ELEMENTS

SD ELEMENTS

Product Info

  • Overview
  • How It Works
  • Content Library
  • Integrations
  • Just-In-Time Training
  • Features

Solutions

  • Use Case Overview
  • Threat Modeling
  • Secure Development

Industries

  • Manufacturing
  • Technology
  • U.S. Federal Government
  • Financial Services

eLearning

  • eLearning Solutions
  • Software Security Practitioner (SSP) Program
  • Course Descriptions - Secure Coding, Cloud & Compliance

ADVISORY

  • Overview
  • Cloud Security Services
  • Penetration Testing
  • Red Team Services

RESOURCES

  • Application Security
  • Authority to Operate (ATO)
  • Secure Development
  • Security Awareness
  • Threat Modeling
Sign-up for our newsletter
Facebook Linkedin Twitter Instagram Youtube
Copyright © 2023 Security Compass. All Rights Reserved.
  • Public Vulnerability Disclosure
  • Accessibility
  • Privacy Policy
  • Legal