Codific
  • Solutions
    • AppSec Management with SAMMY
    • GRC Management with SAMMY
    • Ed-Tech and HR-Tech
      • Secure Video Sharing with Videolab
      • Student Attendance Tracking with Attendance Radar
      • Survey Analysis Automation with SARA
  • Services
    • OWASP SAMM Assessments
    • OWASP SAMM Training
    • OWASP SAMM Guidance
  • Company
    • Our Story
    • Who We Are
    • Codific @ OWASP Global AppSec Barcelona 2025
    • Codific @ OWASP
    • Careers
  • Partners
    • Implementation Partners Program
    • Recommended Vendors Program
      • Our Recommended Vendors
    • Academic Application Security Program
  • Customers
  • Insights
  • Contact
  • Go to SAMMY

Privacy by Design

Home Privacy by Design
HIPAA compliance

12

Dec

HIPAA Implementation: A Guide to Compliance

  • Mahe Pereira
  • Compliance, Cybersecurity, Privacy by Design, Security

HIPAA, the Health Insurance Portability and Accountability Act of 1996, is a critical federal law […]

Read Article
Mappings to OWASP SAMM

07

Dec

NIST 800-53 and NIST 800-171: Key Differences

  • Aram Hovsepyan
  • Compliance, Cybersecurity, NIST SSDF, Privacy by Design, Security, Software security

The U.S. cybersecurity strategy seems to be lightyears ahead of the EU. I strongly believe[…]

Read Article
cyber resilience act regulation

05

Sep

What is the Cyber Resilience Act (CRA) and how to comply with it

  • Dag Flachet
  • Privacy by Design, Security

It this article we explore the essentials of the EU Cyber Resilience Act (CRA), and[…]

Read Article
how to do SAMM assessments

10

May

How to do SAMM assessments: Everything you need to know

  • Michaella Masters
  • Application Security, OWASP, Privacy by Design, SAMM, Security

Want to get started with SAMM?  We have just the thing! Take the free OWASP[…]

Read Article
how to do threat modeling steps

26

Apr

OWASP SAMM: Pragmatic Threat Modeling Best Practices

  • Aram Hovsepyan
  • Privacy by Design, SAMM, Secure Software Development, Security Software Engineer

Threat modeling yields the highest return on investment when it comes to your Application Security[…]

Read Article

Building a simple and safe digital future

  • Visit Codific's LinkedIn channel (opens in a new tab)
  • Visit Codific's YouTube channel (opens in a new tab)

Main Focus

Application Security Compliance Cybersecurity NIST SSDF OWASP Privacy by Design SAMM Secure Software Development Security Security Software Engineer Software security SSDLC

Recent Post

  • Conceptual illustration of the SSDLC

    June 11, 2025

    What Is the SSDLC? A Guide to Secure Development

    June 11, 2025

  • dependency governance in SOOS

    June 03, 2025

    Master Dependency Management with SOOS and SAMM

    June 03, 2025

  • vulnerability management dashboard

    May 26, 2025

    Security metrics with purpose and strategic impact

    May 26, 2025

In the Spotlight

  • SAMMY
  • Secure Video Sharing with Videolab
  • Attendance Radar
  • SARA
  • Terms & Conditions
  • Imprint
  • Cookie Policy
  • Privacy Statement

Codific ® 2025. All rights reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}