Critical Infrastructure Security
We have written before about threats to critical infrastructure. Deservedly, it now has the attention of lawmakers around the world. Critical infrastructure provides citizens with […]
Read More →🔥 Subscribe to Our Monthly Security Digest Newsletter
We have written before about threats to critical infrastructure. Deservedly, it now has the attention of lawmakers around the world. Critical infrastructure provides citizens with […]
Read More →Simplify Threat Modeling with Enhancements to SD Elements Threat Modeling Diagrams, Reusable Components, and Advanced Reporting Capabilities Software threat modeling is a foundational requirement for […]
Read More →In May 2021, the White House issued Executive Order (EO) 14028, “Improving the Nation’s Cybersecurity.” The order was a response to the growing number of […]
Read More →There are two primary sources for vulnerabilities in software. The first – design flaws – result from poor architectural decisions. These can include assuming an […]
Read More →The Balancing Act is our podcast series. We speak to leaders and practitioners about the challenges they face and the strategies they use to defend […]
Read More →We have written before about what threat modeling entails and its many forms. Organizations can take different approaches, particularly when building manual threat models. This […]
Read More →Identify and Mitigate Software Threats Faster with New SD Elements Threat Modeling and Advanced Reporting Capabilities At Security Compass, we continue to enhance our SD […]
Read More →“Value streams are a critical part of integrating our disparate security activities and aligning them to produce business value. Including multiple stakeholders, from business leaders […]
Read More →Building secure software necessitates a holistic approach to security, which includes bringing “secure by design” principles to life. The industry recognizes the benefits of performing […]
Read More →Author: Trevor Young, Security Compass Chief Product Officer In an earlier blog post, we explained why Security Compass commissioned Forrester Consulting to conduct a study […]
Read More →