Codific
  • Solutions
    • AppSec Management with SAMMY
    • GRC Management with SAMMY
    • Ed-Tech and HR-Tech
      • Secure Video Sharing with Videolab
      • Student Attendance Tracking with Attendance Radar
      • Survey Analysis Automation with SARA
  • Services
    • OWASP SAMM Assessments
    • OWASP SAMM Training
    • OWASP SAMM Guidance
  • Company
    • Our Story
    • Who We Are
    • Codific @ OWASP Global AppSec Barcelona 2025
    • Codific @ OWASP
    • Careers
  • Partners
    • Implementation Partners Program
    • Recommended Vendors Program
      • Our Recommended Vendors
    • Academic Application Security Program
  • Customers
  • Insights
  • Contact
  • Go to SAMMY

Cybersecurity

Home Security Cybersecurity
Conceptual illustration of the SSDLC

11

Jun

What Is the SSDLC? A Guide to Secure Development

  • Nicolas Montauban

Most security issues in software stem from one simple problem: teams try to fix them […]

Read Article
vulnerability management dashboard

26

May

Security metrics with purpose and strategic impact

  • Aram Hovsepyan
  • Application Security, Cybersecurity, Security metrics

You’ve probably heard the saying, “You can’t manage what you don’t measure.” If you are[…]

Read Article
how to do threat modeling steps

10

Apr

Master Threat Modeling with Toreon’s World-Class Approach

  • Aram Hovsepyan
  • Application Security, Application Security Management, architecture mitigation, Cybersecurity, threat modeling

Threat modeling shaped my AppSec career. It helped me wrestle with one of security’s most[…]

Read Article
Image of a hacker

24

Feb

A Guide on How to Not Get Hacked

  • Nicolas Montauban
  • Cybersecurity, hacking, Information Security, Security

Have you every been hacked? It sucks right? But don’t worry—now, let’s make sure it[…]

Read Article
False Claims Act

12

Feb

What Is the False Claims Act? A Comprehensive Guide to Understanding its Purpose and Impact

  • Michaella Masters

Fraud against government programs costs taxpayers billions of dollars every year, threatening the integrity of[…]

Read Article
Contingency plan illustration

31

Jan

NIST 800-34 Contingency Planning: A Practical Guide to Resilience

  • Nicolas Montauban
  • Business Continuity, Contingency Plan, Cybersecurity, Disaster Recovery, Incident Response, nist 800-34

In today’s digital landscape, cybercrime is escalating at an alarming rate, with projected damages reaching[…]

Read Article
Cybersecurity Fundamentals framework in one view

12

Jan

What Is CyFun and How to Implement It?

  • Aram Hovsepyan
  • Compliance, Cybersecurity

Introduction In this blog, we will focus on helping you understand what is Cybersecurity Fundamentals[…]

Read Article
how to prevent a data breach

26

Dec

How to get breached: 5 most common attack vectors

  • Aram Hovsepyan
  • Cybersecurity

Dear disgruntled employee (let’s call you Mallory): Tired of working long hours with no holidays,[…]

Read Article
How to implement NIST 800-53

19

Dec

How to implement NIST 800-53

  • Nicolas Montauban
  • Compliance, Cybersecurity, Implementation, NIST, NIST 800-53, Security Controls

Navigating the complexities of cybersecurity frameworks can be challenging, but understanding how to implement NIST[…]

Read Article
A visually modern illustration of a secure digital network with interconnected nodes and locks symbolizing cybersecurity controls, representing the comprehensive protection offered by frameworks like NIST 800-53.

19

Dec

What is NIST 800-53? A comprehensive guide

  • Nicolas Montauban
  • Compliance, Cybersecurity, NIST, NIST 800-53, Security Controls

In the evolving landscape of cybersecurity, organizations face the challenge of protecting their systems and[…]

Read Article
HIPAA compliance

12

Dec

HIPAA Implementation: A Guide to Compliance

  • Mahe Pereira
  • Compliance, Cybersecurity, Privacy by Design, Security

HIPAA, the Health Insurance Portability and Accountability Act of 1996, is a critical federal law[…]

Read Article
Security frameworks ontology

12

Dec

Information Security and Cybersecurity: Understanding the Layers

  • Aram Hovsepyan
  • Application Security, Cybersecurity, Information Security, Secure Software Development

The terms information security and cybersecurity are often used interchangeably, which frequently leads to confusion.[…]

Read Article
Next

Building a simple and safe digital future

  • Visit Codific's LinkedIn channel (opens in a new tab)
  • Visit Codific's YouTube channel (opens in a new tab)

Main Focus

Application Security Compliance Cybersecurity NIST SSDF OWASP Privacy by Design SAMM Secure Software Development Security Security Software Engineer Software security SSDLC

Recent Post

  • Conceptual illustration of the SSDLC

    June 11, 2025

    What Is the SSDLC? A Guide to Secure Development

    June 11, 2025

  • dependency governance in SOOS

    June 03, 2025

    Master Dependency Management with SOOS and SAMM

    June 03, 2025

  • vulnerability management dashboard

    May 26, 2025

    Security metrics with purpose and strategic impact

    May 26, 2025

In the Spotlight

  • SAMMY
  • Secure Video Sharing with Videolab
  • Attendance Radar
  • SARA
  • Terms & Conditions
  • Imprint
  • Cookie Policy
  • Privacy Statement

Codific ® 2025. All rights reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}