securitycompass-logo
  • Products

    Developer-centric Threat Modeling

    Continuously model threats at scale and proactively write code that significantly reduces risks and remediation costs.

    Learn More

    About  Careers  Partners

    SD Elements

    Application Security Training

    Product Info

    Overview
    How It Works
    Pricing
    Features
    Content Library
    Integrations
    Just-In-Time Training

    Solutions

    Overview
    Threat Modeling
    Secure Development

    Industries

    Technology
    Manufacturing
    Financial Services & Insurance
    U.S. Federal Government

    Application Security Training

    eLearning

    Application Security Training
    Software Security Practitioner Program
    Course Descriptions - Secure Coding, Cloud & Compliance
  • Services

    Services

    Our services help enterprises meet compliance requirements and raise security standards. We offer eLearning courses in application security, operation security, and compliance that teach secure software development principles to development teams, in addition to general security awareness suitable for non-technical learners.

    About   Careers  Partners

    Advisory

    Security Compass Advisory is now part of Kroll. Read the press release.
    Kroll Logo
    • Overview

      We can help to strengthen your security posture and reduce risk.
    • Cloud Security Services

      Operate smoothly in the cloud while satisfying security and regulatory concerns.
    • Penetration Testing

      Streamline Your Operations with a Penetration Testing Program
    • Red Team Services

      Strengthen Your Defenses With the Full Picture
  • Resources

    Research

    Security Compass’ research team creates insights that challenge the way we think.

    Learn More

    Upcoming Events

    Join us at one of our virtual or in-person events.

    Event Calendar
    About   Careers  Partners

    Resources

    Media

    Blog
    Podcast
    SC In The News
    Videos
    Webinars

    Documents

    Case Studies
    Datasheets
    Guides & Whitepapers
    Research Reports

    Application Security Training

    Infographics
    Training Courses
  • About Us
  • Contact Us
  • Book Demo
  • Mobile Only
    Contact Us
    Book Demo
    Careers
    Partners

Tag: TOFU

GDPR Compliance: How to prepare for the EU’s new personal information rules

March 9, 2022
 |  No Comments
 |  Blog

By Mina Miri and Nathanael Mohammed General Data Protection Regulation (GDPR) will change the way the European Union handles personal information by enforcing strict guidelines on how that information […]

Read More →

Cybersecurity Awareness Month: Understanding the Importance of a Strong Security Culture

 |  No Comments
 |  Blog

October is National Cybersecurity Awareness Month. As demonstrated by the recent Equifax breach, where hackers obtained an estimated 143 million American consumers’ personally identifiable information, including Social […]

Read More →

The ePrivacy Regulation: its background and how it compares to the GDPR

 |  No Comments
 |  Blog

Data privacy in the EU will soon be guided by two regulations: the General Data Protection Regulation (GDPR), which most people are familiar with, and […]

Read More →

A New GDPR Solution for Application Development

 |  No Comments
 |  Blog

Developed in partnership with a large tech company client “Don’t GDPR me, bro!” I overheard someone say this to a barker on the floor at RSA. […]

Read More →

Babies and Boardrooms

 |  No Comments
 |  Blog

“Security Compass has made me more proud of myself than I’ve ever been. I honestly feel that I’m a better Mom because of my work-life […]

Read More →

Tips for Security Leaders on Communicating with the Business

 |  No Comments
 |  Blog

It’s no secret that a communication gap exists between security leaders and the business — and it’s time security leaders did something about it. An inability to […]

Read More →

Five Tips for Hiring and Developing Security Staff Using Security Certifications

 |  No Comments
 |  Blog

Hiring security staff is no easy task. The demand for IT professionals with security expertise far exceeds supply. In an effort to weed out unqualified […]

Read More →

Shining a light on application layer DDoS attacks

 |  No Comments
 |  Blog

DDoS attacks are rightly understood as one of the biggest cyber threats today, with their frequency and size growing every year and their financial consequences […]

Read More →

Dynamic DDoS Defense

 |  No Comments
 |  Blog

Intro Let’s face it, DDoS attacks are growing both in size and complexity. Botnets used to launch DDoS attacks can contain anywhere from hundreds of […]

Read More →

Women In Tech: Opheliar Chan

 |  No Comments
 |  Blog

Opheliar Chan This blog series allows us to get to know multiple women in the Security and Technology Industry. It is interesting to see the […]

Read More →

Posts navigation

Back 1 2 3 4 5 6 … 13 Next

Topics

  • Application Security
  • Application Security – Fundamentals
  • Application Security – Secure Coding
  • Application Security – Secure Mobile
  • Application Security Training
  • Authority to Operate
  • Blog
  • CIO
  • CISO
  • Compliance
  • Curriculum
  • DevSecOps
  • Financial Services
  • General Awareness
  • Government
  • Insurance
  • Manufacturing
  • Operational Security
  • Product Updates
  • Reports
  • Risk Assessment
  • Secure Development
  • Security Analyst
  • Security Awareness
  • Software Developer
  • Technology
  • Threat Modeling
  • Training

ABOUT US

CAREERS

PARTNERS

RESEARCH

SUPPORT

TRAINING SUPPORT

SD ELEMENTS

SD ELEMENTS

Product Info

  • Overview
  • How It Works
  • Content Library
  • Integrations
  • Just-In-Time Training
  • Features

Solutions

  • Use Case Overview
  • Threat Modeling
  • Secure Development

Industries

  • Manufacturing
  • Technology
  • U.S. Federal Government
  • Financial Services

Application Security Training

  • Application Security Training
  • Software Security Practitioner (SSP) Program
  • Course Descriptions - Secure Coding, Cloud & Compliance

ADVISORY

  • Overview
  • Cloud Security Services
  • Penetration Testing
  • Red Team Services

RESOURCES

  • Application Security
  • Authority to Operate (ATO)
  • Secure Development
  • Security Awareness
  • Threat Modeling
Sign-up for our newsletter
Facebook Linkedin Twitter Instagram Youtube
Copyright © 2023 Security Compass. All Rights Reserved.
  • Public Vulnerability Disclosure
  • Accessibility
  • Privacy Policy
  • Legal