{"data":[{"id":629715518,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Zero Trust Security: Moving From a Network-Centric Approach","description":"Zero Trust is a security model that requires users and systems to verify their identity and meet authorization requirements with each system interaction.","seo_title":"Zero Trust Security: Moving From a Network-Centric Approach","seo_description":"Zero Trust is a security model that requires users and systems to verify their identity and meet authorization requirements with each system interaction.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/what-is-zero-trust-security","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMjg2NjAwJnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTBmZDdlZTY3YThiNDEyMTBiZWI1MjIyNTNlNmJlYTgx\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1286600","published":"

Security teams have long used the principle of least privilege; providing users with the minimum, explicit permissions while defaulting to deny permissions.<\/p>\n\n

Least privilege isn’t explicit about “not trusting” users or systems. It simply states that there is no logical reason to extend “extra” permissions to users and systems that do not require them to perform a task.<\/p>\n\n

Zero Trust takes this a step further — requiring users and systems to verify their identity and meet authorization requirements with each system interaction, then applying the least privilege access.<\/strong><\/p>\n\n

Download this whitepaper to learn why you need to take a zero trust approach to cybersecurity.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2020-09-09T09:56:39-0400","external_modified_at":"2020-09-09T13:56:39-0400","created_at":"2020-09-09T13:56:40-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-09-09T13:56:39-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":630907226,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"SaaS vs. On-Premise Solutions: Risk Implications","description":"Organizations often struggle to decide between a SaaS and on-premise deployment model. In this whitepaper, we address the risk implications of running SD Elements in each model.","seo_title":"SaaS vs. On-Premise Solutions: Risk Implications","seo_description":"Organizations often struggle to decide between a SaaS and on-premise deployment model. In this whitepaper, we address the risk implications of running SD Elements in each model.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/saas-vs-on-premise-solutions","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMjg5NDExJnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWNhNmVmZWU5YTI0NTczMjYzNTJlMGZjNDE4OTQ5M2Rl\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1289411","published":"

SD Elements helps organizations inject security early in the application development process. When used in a Software-as-a-Service (SaaS) model, questions often arise about the security implications of the information managed “in the cloud.”<\/p>\n\n

Download this whitepaper to learn about the security, productivity, and financial implications of each deployment model.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2020-09-17T11:05:54-0400","external_modified_at":"2020-09-17T15:05:54-0400","created_at":"2020-09-17T15:05:56-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-09-17T15:05:54-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":631071161,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Business Case for Automating Threat Modeling, Risk Assessment, and Secure Coding Requirements","description":"Automating threat modeling and secure coding requirements helps organizations enhance their security posture, reduce time taken for security activities, and save costs significantly.","seo_title":"Business Case for Automating Threat Modeling, Risk Assessment, and Secure Coding Requirements","seo_description":"Automating threat modeling and secure coding requirements helps organizations enhance their security posture, reduce time taken for security activities, and save costs significantly.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/automating-threat-modeling-and-secure-coding","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMjkwMDExJnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTkzZmNkMDAzZTg3MTdiYzYwNmUyZTZmOGNhZWIxNzkz\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1290011","published":"

For too long organizations have faced a dilemma in building software — go fast and deliver required functionality to market quickly while sacrificing security. Or, stay safe by performing manual threat modeling, risk assessments, and secure coding practices while slowing down development.<\/p>\n\n

The key question most organizations have is, how can we become “Fast and Safe” in application development?<\/strong><\/p>\n\n

Download this whitepaper to learn how automating security activities can enable you to develop products faster and safer.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2020-09-18T12:08:33-0400","external_modified_at":"2020-09-18T16:08:33-0400","created_at":"2020-09-18T16:08:34-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-09-18T16:08:33-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":632679949,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Why Cybersecurity Is Important for Your Brand Reputation","description":"Cybersecurity isn't just a technology issue. Data breaches can severely damage your brand reputation which is why you should ensure reasonable data security.","seo_title":"Why Cybersecurity Is Important for Your Brand Reputation","seo_description":"Cybersecurity isn't just a technology issue. Data breaches can severely damage your brand reputation which is why you should ensure reasonable data security.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/cybersecurity-for-brand-reputation","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMjkzMTM5JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWFiYzdhMTZlYmMyMjBjZjg0MzA5ZGJhYmMyNmM3NTYw\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1293139","published":"

Trust is critical to building a successful business. The 2020 Edelman Trust Barometer<\/a> found that people were over six times more likely to pay a premium for a product and had higher brand loyalty for companies they trusted highly.<\/p>\n\n

Trust includes an organization’s commitment to protecting confidential and sensitive information.<\/strong> While brand reputation can deprecate at any point, it is most impactful when a breach can be directly attributed to the organization charged with protecting the information.<\/p>\n\n

Download this whitepaper to learn how cybersecurity contributes to your brand image.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2020-09-29T13:13:16-0400","external_modified_at":"2020-09-29T17:13:16-0400","created_at":"2020-09-29T17:13:17-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-09-29T17:13:16-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":632812390,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Building a Business Case for Secure Application Development","description":"Making a strong business case for software security will not only help you to get buy-in from leadership; but also ensure alignment with the organizational goals.","seo_title":"Building a Business Case for Secure Application Development","seo_description":"Learn how you can make a business case for software security that helps to gain buy-in from leadership. Get the free guide now.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/building-business-case-for-software-security","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMjkzNDM2JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTc0MDhmMmI4ODg5MDU0OTBkNzI2ZWZjMTk5Njg3ZjZi\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1293436","published":"

Technology is changing at a rapid pace, making it necessary for organizations to constantly innovate and introduce new features to their products. While delivery speed is important, compromising on application security can have a disastrous impact on your business. Resultantly, organizations are under intense pressure to balance software delivery speed with security.<\/p>\n\n

Doing both isn’t easy — so it eventually comes down to choosing between speed and safety. This continuous tussle between security and speed makes it difficult for security teams to sell their business case to the leadership.<\/p>\n\n

Get this guide to learn how you can make a strong business case for secure development that aligns with the broader organizational goals.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2020-09-30T10:14:51-0400","external_modified_at":"2022-06-27T11:29:02-0400","created_at":"2020-09-30T14:14:52-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-09-30T14:14:51-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":635021686,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Is There a Cybersecurity Skills Shortage?","description":"To close the current skills gap in cybersecurity, over 4 million professionals are required globally. Can automation help you to ensure security when there's a massive shortage of skilled resources?","seo_title":"eBook: How Can You Bridge the Cybersecurity Skills Gap?","seo_description":"To close the current skills gap in cybersecurity, over 4 million professionals are required globally. Can automation help you to ensure security when there's a massive shortage of skilled resources?","url":"https:\/\/resources.securitycompass.com\/whitepapers\/is-there-a-cybersecurity-skills-shortage","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMjk5Njk3JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTBlYjVmNWRmYzY3NTFiYTFmYTEwNjM2ZWYxNDVlMjkz\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1299697","published":"

In April 2019, the global cybersecurity workforce was estimated to be around 2.08 million as per a study by (ISC)². There's a need for 4.07 million additional professionals to meet the demand in the market.<\/p>\n\n

In a situation where there's a massive shortage of security professionals, how can organizations ensure security?<\/p>\n\n

Download this eBook to learn more about the skills gap in cybersecurity and how you can improve security through Balanced Development Automation.<\/p>","draft":null,"source_url":null},"author":{"id":2984750,"first_name":"Kevin","last_name":"Delaney","full_name":"Kevin Delaney","username":"kdelaney@securitycompass.com-del-2984750","email":"kdelaney@securitycompass.com-del-2984750","bio":"Kevin Delaney is the Director of Solutions Engineering at Security Compass. A lifelong passionate technologist, he has previously appeared on Bloomberg, CBC, CTV, CP24, and BNN to share his insights and commentary on current topics in the information security space. Kevin holds a Bachelor's degree from UOIT in Information Technology, specializing in Networking & Security.","twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2020-10-15T18:14:10-0400","external_modified_at":"2020-10-29T23:27:01-0400","created_at":"2020-10-15T22:14:12-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-10-15T22:14:10-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":637030252,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Mapping Security Awareness Training to Regulatory Requirements","description":"Most regulatory standards require organizations to provide security awareness training to their employees. Download this whitepaper to learn how you can comply with these requirements.","seo_title":"Security Awareness Training | Compliance Mapping","seo_description":"Most regulatory standards require organizations to provide security awareness training to their employees. Download this whitepaper to learn how you can comply with these requirements.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/security-awareness-training","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMzA1MTAwJnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTdkNzEwY2UzOTg1NWY2OTNmYjY3NDI5OTU2OWZiMjhk\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1305100","published":"

Software security training programs help build a culture of security in your organization as well as raise awareness among employees. It’s also a requirement under many regulatory standards and laws.<\/p>\n\n

Download this whitepaper to learn about the compliance requirements for security training under different regulations.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2020-10-29T18:32:05-0400","external_modified_at":"2020-10-29T22:32:05-0400","created_at":"2020-10-29T22:32:05-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-10-29T22:32:05-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":639962710,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"How You Can Ensure Secure Cloud Migration","description":"Cloud migrations offer a lot of benefits, but you need to ensure data security to make the move successful. Learn how you can migrate securely.","seo_title":"Whitepaper | Best Practices for Secure Cloud Migration","seo_description":"Cloud migrations offer a lot of benefits, but you need to ensure data security to make the move successful. Learn how you can migrate securely.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/how-you-can-ensure-secure-cloud-migration","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMzExMjY4JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTdmNDQ5NTRmNTM0YmYxZGE1YzZhNzc3ZmM2NTFmZGFk\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1311268","published":"

Secure cloud migration is a significant challenge for organizations.<\/h2>\n\n

Cloud migration is a business priority for financial institutions. The benefits can be transformational; faster reactivity, better time to market, improved customer satisfaction, increased productivity, and new cloud-enabled business initiatives.<\/p>\n\n

However, risk management and regulatory oversight from institutions like FINRA, the OCC, and OSFI, particularly after the Capital One breach, mean that organizations need to incorporate security into the entire lifecycle of cloud migration.<\/p>\n\n

Download this whitepaper to learn how you can migrate securely to the cloud.<\/strong><\/p>","draft":null,"source_url":null},"author":{"id":2984744,"first_name":"Rohit","last_name":"Sethi","full_name":"Rohit Sethi","username":"rohit@securitycompass.com-del-2984744","email":"rohit@securitycompass.com-del-2984744","bio":"Rohit Sethi is the Chief Executive Officer of Security Compass and focuses on helping organizations balance product security with time to market. He joined Security Compass in 2006 and has played an integral part in helping the company with its strategic transformation. He was instrumental in the development of the company\u2019s flagship product, SD Elements. In his previous role as the company\u2019s COO, Rohit was responsible for designing and achieving corporate objectives, company alignment, and driving strategy to execution.\nHe has appeared as a security expert on news media channels such as Bloomberg, CNBC, and FoxNews. He also regularly speaks at leading industry conferences and has contributed thought leadership articles to major publications such as CNN, the Huffington Post, and InfoQ.","twitter_id":null,"avatar_url":"https:\/\/content.cdntwrk.com\/files\/YV91PTI5ODQ3NDQmbW9kaWZpZWQ9MjAyMi0wNS0xMyAxMDo0ODoxNCZzaWc9NThmODJhYzc1MzczNDI0OTUyOGFhYTQ1MDMxNDM5ZjU%253D"},"hide_publish_date":false,"external_created_at":"2020-11-20T12:04:55-0500","external_modified_at":"2020-11-20T17:04:56-0500","created_at":"2020-11-20T17:04:57-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-11-20T17:04:55-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":641741533,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Cloud Adoption in the Financial Services Industry","description":"Despite the benefits of cloud computing, financial institutions lag behind other industries in terms of cloud adoption. The risk of data loss and regulatory compliance are some of the major concerns.","seo_title":"Cloud Adoption in the Financial Services Industry","seo_description":"Despite the benefits of cloud computing, financial institutions lag behind other industries in terms of cloud adoption. The risk of data loss and regulatory compliance are some of the major concerns.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/cloud-adoption-in-the-financial-services-industry","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMzE4NjEyJnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTI4OWJiOGIyOWE0OTFkZTY5ZDY1YjY4YzlmMjAyM2Yz\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1318612","published":"

Digital transformation has become a top priority for financial services firms around the world. With the cloud becoming a fundamental enabler of innovation and digital transformation, financial institutions are mirroring the broader business market and adopting cloud technologies.<\/p>\n\n

Download this whitepaper to learn about the challenges these organizations face in terms of financial regulatory oversight and risk management.<\/p>","draft":null,"source_url":null},"author":{"id":2984744,"first_name":"Rohit","last_name":"Sethi","full_name":"Rohit Sethi","username":"rohit@securitycompass.com-del-2984744","email":"rohit@securitycompass.com-del-2984744","bio":"Rohit Sethi is the Chief Executive Officer of Security Compass and focuses on helping organizations balance product security with time to market. He joined Security Compass in 2006 and has played an integral part in helping the company with its strategic transformation. He was instrumental in the development of the company\u2019s flagship product, SD Elements. In his previous role as the company\u2019s COO, Rohit was responsible for designing and achieving corporate objectives, company alignment, and driving strategy to execution.\nHe has appeared as a security expert on news media channels such as Bloomberg, CNBC, and FoxNews. He also regularly speaks at leading industry conferences and has contributed thought leadership articles to major publications such as CNN, the Huffington Post, and InfoQ.","twitter_id":null,"avatar_url":"https:\/\/content.cdntwrk.com\/files\/YV91PTI5ODQ3NDQmbW9kaWZpZWQ9MjAyMi0wNS0xMyAxMDo0ODoxNCZzaWc9NThmODJhYzc1MzczNDI0OTUyOGFhYTQ1MDMxNDM5ZjU%253D"},"hide_publish_date":false,"external_created_at":"2020-12-11T10:57:29-0500","external_modified_at":"2020-12-11T16:29:26-0500","created_at":"2020-12-11T16:29:26-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-12-11T15:57:29-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":641741647,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Insurance Data Security Model Law \u2013 What It Means for Software Security","description":"The Data Security Model Law impacts everyone working in the insurance industry and requires insurers to maintain an information security program. Learn the requirements under this law.","seo_title":"The NAIC Insurance Data Security Model Law: Things to Know","seo_description":"The Data Security Model Law impacts everyone working in the insurance industry and requires insurers to maintain an information security program. Learn the requirements under this law.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/insurance-data-security-model-law-what-it-means-for-software-security","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMzEzNjI5JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWQxMDE3MzU2YTgxNjlmOTFhMjlhZWY5NjBlOGJhYmQy\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1313629","published":"

In light of multiple high-profile data breaches leading to the compromise of sensitive personal information, the National Association of Insurance Commissioners (NAIC) drafted and adopted the Insurance Data Security Model Law recently.<\/p>\n\n

Download this whitepaper to learn about the requirements and adoption of this law across different states in the U.S.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2020-11-30T16:38:40-0500","external_modified_at":"2020-12-11T16:30:37-0500","created_at":"2020-12-11T16:30:38-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-11-30T21:38:40-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":646344256,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Software Security: An Enabler for Development Teams","description":"In many organizations, software security is perceived as a roadblock. The apparent challenge lies in balancing the need to meet software development deadlines with security.","seo_title":"Actionable Steps: Integrating Security Into Development","seo_description":"In many organizations, software security is perceived as a roadblock. The apparent challenge lies in balancing the need to meet software development deadlines with security.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/software-security-an-enabler-for-development-teams","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMzM1Mzc2JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTlmZDgwNGU0MGExNTU1MzY0ZjlkY2FhNWY1YWJkYTg3\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1335376","published":"

In many organizations, DevOps teams see software security as a roadblock since false positives slow down the software development process.<\/p>\n\n

Security teams, on the other hand, view things differently. Given the small size of many security teams, it is difficult to try and respond to all of the problems. The apparent challenge lies in balancing the need for both speed and security.<\/p>\n\n

Download this whitepaper to get actionable steps for integrating security into development.<\/p>","draft":null,"source_url":null},"author":{"id":3935858,"first_name":"Altaz","last_name":"Valani","full_name":"Altaz Valani","username":"avalani@securitycompass.com-del-3935858","email":"avalani@securitycompass.com-del-3935858","bio":"Altaz is the Director of Insights Research and is responsible for managing the overall research vision at Security Compass. Prior to joining SC, he had served as a Senior Research Director and Executive Advisor at Info-Tech Research Group, Senior Manager at KPMG, as well as held various positions working alongside senior stakeholders to drive business value through software development. Valani is on the SAFECode Technical Leadership Council, CIO Strategy Council, the Open Group, and also contributes to several IEEE working groups.","twitter_id":null,"avatar_url":"https:\/\/content.cdntwrk.com\/files\/YV91PTM5MzU4NTgmbW9kaWZpZWQ9MjAyMi0wNS0xMyAxMDo0ODoxNCZzaWc9NTgwNjc2MjYyZjRjZTY4NDYwNDRiZmFjYWEzYTJmMTI%253D"},"hide_publish_date":true,"external_created_at":"2021-02-01T12:45:27-0500","external_modified_at":"2021-02-01T17:45:28-0500","created_at":"2021-02-01T17:45:29-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2021-02-01T17:45:27-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":646548355,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Enhancing Cybersecurity in Financial Services","description":"Financial institutions are a major target of cyber attackers. Defending against new cyberthreats has become vital for financial institutions to gain consumer trust and stay ahead of the competition.","seo_title":"Enhancing Cybersecurity in Financial Services","seo_description":"Financial institutions are a major target of cyber attackers. Defending against new cyberthreats has become vital for financial institutions to gain consumer trust and stay ahead of the competition.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/enhancing-cybersecurity-in-financial-services","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMzM2MTE3JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWRhY2QzNjRkNGMwNzhlMThjNTlhZjkwNTU2NDg4MTQw\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1336117","published":"

Competitive pressure requires financial services firms to respond quickly to customers’ needs. Rather than making software updates once in a while, it is now common for DevOps teams to push dozens of updates to production every day.<\/p>\n\n

As speed to market and better customer experience becomes more critical, concerns about cybersecurity have become equally vital. Because financial services firms are a top target for hackers.<\/p>\n\n

Download this whitepaper to learn how you can ensure security in an ever-evolving financial services landscape.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2021-02-03T13:21:20-0500","external_modified_at":"2021-02-03T18:21:21-0500","created_at":"2021-02-03T18:21:21-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2021-02-03T18:21:20-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":647435596,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"The Developer-First Application Security Approach","description":"With growing attack vectors, application security has become more mainstream than ever. Learn how developers can ensure software security all by themselves.","seo_title":"The Developer-First Application Security Approach","seo_description":"With growing attack vectors, application security has become more mainstream than ever. Learn how developers can ensure software security all by themselves.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/application-security-for-developers","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMzM5NjQ4JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTY0MGE5MjVmOGViNTk1ZmVjMmU3OTE5Y2UzOGEzYzhl\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1339648","published":"

The move by organizations to DevOps and other rapid development and deployment methodologies has challenged security. The old model of a separate application security team with exclusive responsibility to identify and prioritize vulnerabilities simply does not work in today’s environment.<\/p>\n\n

The need to release code quickly — and securely — requires a different approach. Download this whitepaper to learn how developers can ensure software security all by themselves.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2021-02-12T13:56:48-0500","external_modified_at":"2021-02-12T18:56:48-0500","created_at":"2021-02-12T18:56:49-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2021-02-12T18:56:48-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":647899204,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Building a Product Security Practice in a DevOps World","description":"What is product security and how does it differ from software security? Learn why product security is gaining popularity and how you can build key capabilities.","seo_title":"Building Key Product Security Capabilities","seo_description":"What is product security and how does it differ from software security? Learn why product security is gaining popularity and how you can build key capabilities.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/building-key-product-security-capabilities","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMzQwNjg5JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTZkNzUyYWIwYzRiNWM0ZWM5ZDU1OTVmODAxMmJiNDQw\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1340689","published":"

There is a lot of emphasis today on software development and delivery. The narrative largely focuses on the speed of delivery through automated pipelines. Unfortunately, little attention has been paid to product security. However, product security is gaining popularity slowly.<\/p>\n\n

With the integration of product and software lifecycle workflows, managing security across both domains is becoming an essential capability. The key aspect is being able to integrate software and product life cycles in a coherent manner so that the final product is secure.<\/p>\n\n

Download this whitepaper to learn about key product security capabilities and a holistic governance framework to bring these two domains together.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2021-02-17T11:45:44-0500","external_modified_at":"2021-02-17T16:45:45-0500","created_at":"2021-02-17T16:45:46-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2021-02-17T16:45:44-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":649431650,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Cloud Migration: How To Move Your Applications Securely","description":"For many organizations considering cloud migration, the global pandemic accelerated their move. As this trend continues, the need to ensure data security will keep gaining momentum.","seo_title":"Cloud Migration: How To Move Your Applications Securely","seo_description":"For many organizations considering cloud migration, the global pandemic accelerated their move. As this trend continues, the need to ensure data security will keep gaining momentum.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/how-to-securely-move-applications-to-the-cloud","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMzQ3MzIwJnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTk3MmIxOGQzNDZmNTBiNjkzOGIwOTg5NWEzMmRlYmFi\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1347320","published":"

The journey of moving workloads — infrastructure, applications, and other computing resources — to the cloud has begun. For many organizations, the onset of a global pandemic accelerated this move as people had to pivot to working remotely.<\/p>\n\n

As cloud adoption continues, it is more important than ever to boost cloud security, starting from when workloads are moved to the cloud, to reduce the risk of introducing vulnerabilities into these environments.<\/p>\n\n

Download this whitepaper to learn how you can migrate applications to the cloud securely.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2021-03-04T16:39:11-0500","external_modified_at":"2021-03-04T21:39:11-0500","created_at":"2021-03-04T21:39:12-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2021-03-04T21:39:11-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":650439367,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Evolving Threat Modeling for Agility and Business Value","description":"Traditional threat modeling approaches are no longer scalable or accurate in an agile, cloud-based, microservices world. How can we evolve threat modeling to fit DevSecOps processes?","seo_title":"Managing the Challenges With Threat Modeling","seo_description":"Traditional threat modeling approaches are no longer accurate in an agile, cloud-based world. How can we evolve threat modeling to fit DevSecOps processes?","url":"https:\/\/resources.securitycompass.com\/whitepapers\/evolving-threat-modeling-for-agility","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMzUwNjgyJnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWY3NWRhNTUxMDVjOTA1Yjg2OGVjMjYzNDMzZWU1MWM1\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1350682","published":"

Threat modeling represents a plethora of different practices to analyze a system from a security perspective.<\/p>\n\n

In the early days, threat modeling was much simpler and based on systems where threat vectors against the system were well-known. In such cases creating diagrams manually was easier — we had controlled access to the few systems that were available. But in today’s DevSecOps world, things look quite different.<\/p>\n\n

In this whitepaper, we focus on threat modeling from a general perspective, without delving into a specific methodology. The considerations and recommendations collected here should therefore be applicable to most approaches.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2021-03-15T11:11:58-0400","external_modified_at":"2021-03-30T21:32:02-0400","created_at":"2021-03-15T15:12:00-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2021-03-15T15:11:58-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":651506014,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Ensuring Cybersecurity in an Open Banking World","description":"Open banking gives us new business opportunities and convenience for customers. But how secure is this new business model?","seo_title":"Data Privacy and Security for an Open Banking World","seo_description":"Open banking gives us new business opportunities and convenience for customers. But how secure is this new business model?","url":"https:\/\/resources.securitycompass.com\/whitepapers\/ensuring-cybersecurity-in-an-open-banking-world","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMzU2MTIxJnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWViMTIyNTQ3YjhkNWM4YzAwNWU0ZWM2YWMzNzcwNDQ3\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1356121","published":"

The digital transformation of businesses is occurring across all industries. Its effect on the financial services industry<\/a> has also been rapid and is accelerating. New business models have disrupted the traditional banking industry and consumers are not limited to local providers anymore.<\/p>\n\n

While this has presented new challenges to traditional financial institutions, it offers many opportunities for their customers and innovative competitors. Reducing the need for physical branches lowers costs and enables organizations to offer consumer-friendly services such as lower maintenance fees, reimbursable ATM fees, higher savings, and CD yields.<\/p>\n\n

Disruptions in the sector have also posed new cyber threats for financial institutions. Download this whitepaper to learn what are the security concerns with open banking and how you can ensure security.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2021-03-26T16:00:05-0400","external_modified_at":"2021-03-29T16:22:01-0400","created_at":"2021-03-26T20:39:56-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2021-03-26T20:00:05-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":656242381,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Best Practices to Ensure Firmware Security","description":"As software layer breaches get increasingly traced to firmware vulnerabilities, we must consider building secure products. Read more to get actionable steps on how to ensure firmware security.","seo_title":"Best Practices to Ensure Firmware Security","seo_description":"As software layer breaches get increasingly traced to firmware vulnerabilities, we must consider building secure products. Read more to get actionable steps on how to ensure firmware security.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/best-practices-to-ensure-firmware-security","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMzcyNzM1JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWM5MzA4MDc1NTRmODhlZDc4NGNkMjI0ODkyNzEzYWVk\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1372735","published":"

When we consider software security, we often tend to think only about cloud and mobile applications. What’s often missing in our discussions is the software that exists within hardware components, namely firmware.<\/p>\n\n

In today’s world, where attacks can occur at the software or hardware layers, we need to extend our traditional software security models to include firmware.<\/p>\n\n

Download this whitepaper to learn about:<\/strong><\/p>\n\n