DevOps & Software Security: Turning unplanned work into planned work
Every IT worker I’ve met has heard me rave about The Phoenix Project. The book uses an all-too-realistic fictional scenario to discuss the behaviors of a […]
Read More →🔥 Subscribe to Our Monthly Security Digest Newsletter
Every IT worker I’ve met has heard me rave about The Phoenix Project. The book uses an all-too-realistic fictional scenario to discuss the behaviors of a […]
Read More →There is a pervasive sentiment amongst the security community about checklists: they suck. We’ve all seen inflexible audit checklists that seem to be highly irrelevant […]
Read More →Suppose Acme Inc., a multi-billion dollar company, suffers a web application breach that results in loss of critical client data. Buoyed by news of legal […]
Read More →There’s a common misconception that security requirements are only useful for net new applications. Most people think once an application has been developed, it’s too […]
Read More →At Security Compass, we had the experience of building secure programming guideline documents for a number of clients. Unfortunately, we found that in many cases the […]
Read More →