SD Elements support for EO 14028, “Improving the Nation’s Cybersecurity”
In May 2021, the White House issued Executive Order (EO) 14028, “Improving the Nation’s Cybersecurity.” The order was a response to the growing number of […]
Read More →🔥 Subscribe to Our Monthly Security Digest Newsletter
🔥Live Webinar: Exclusive Research on Why Devs Resist AppSec Training—And How to Fix It! 🔥
In May 2021, the White House issued Executive Order (EO) 14028, “Improving the Nation’s Cybersecurity.” The order was a response to the growing number of […]
Read More →There are two primary sources for vulnerabilities in software. The first – design flaws – result from poor architectural decisions. These can include assuming an […]
Read More →The Balancing Act is our podcast series. We speak to leaders and practitioners about the challenges they face and the strategies they use to defend […]
Read More →We have written before about what threat modeling entails and its many forms. Organizations can take different approaches, particularly when building manual threat models. This […]
Read More →Identify and Mitigate Software Threats Faster with New SD Elements Threat Modeling and Advanced Reporting Capabilities At Security Compass, we continue to enhance our SD […]
Read More →“Value streams are a critical part of integrating our disparate security activities and aligning them to produce business value. Including multiple stakeholders, from business leaders […]
Read More →Building secure software necessitates a holistic approach to security, which includes bringing “secure by design” principles to life. The industry recognizes the benefits of performing […]
Read More →Author: Trevor Young, Security Compass Chief Product Officer In an earlier blog post, we explained why Security Compass commissioned Forrester Consulting to conduct a study […]
Read More →Application security and software development teams know they need to mature their application security program so they can more proactively identify software security threats and […]
Read More →Companies of all sizes face increased pressure to start or mature their application security programs. Determining how to do so can be confusing, especially with […]
Read More →