Codific
  • Solutions
    • AppSec Management with SAMMY
    • GRC Management with SAMMY
    • SAMMY Versions
    • Ed-Tech and HR-Tech
      • Secure Video Sharing with Videolab
      • Student Attendance Tracking with Attendance Radar
      • Survey Analysis Automation with SARA
  • Services
    • OWASP SAMM Assessments
    • OWASP SAMM Training
    • OWASP SAMM Guidance
  • Customers
    • Zebra Technologies
    • Sigma Software Group
    • Sign In Solutions
    • Kiloverse
    • Approach Cyber
    • All Customer Stories
  • Company
    • Our Story
    • Who We Are
    • Codific @ OWASP
    • Codific @ OWASP Global AppSec Washington D.C. 2025
    • Careers
  • Partners
    • Implementation Partners Program
      • Partner Success Story
    • Academic Application Security Program
  • Insights
    • Blog
    • The AppSec Management Podcast
    • Application Security Science
    • Press Coverage
  • Contact
  • Go to SAMMY

Security

Home Security Page 2
ISO Logo

01

May

Is ISO 27001 Worth It?

  • Michaella Masters
  • ISO, Security

Is ISO 27001 worth it? In this blogpost we will be discussing ISO 27001. What […]

Read Article

26

Apr

OWASP SAMM: Policy and Compliance

  • Nicolas Montauban
  • OWASP, Security

OWASP is the Open Worldwide Application Security Project. It is a non-profit foundation that works[…]

Read Article

26

Apr

Types of Software Backups

  • Michaella Masters
  • Application Security, Security

Software Backups Reasons to back up your software seem pretty obvious, however as it can[…]

Read Article
the cost of introducing application security, the cost of security at a scale up

28

Mar

The cost of introducing application security at a scale-up

  • Aram Hovsepyan
  • Application Security, Security

Software security is now a number one risk worldwide. It is literally on the US[…]

Read Article

23

Mar

OWASP SDLC: Building your SSDLC with OWASP SAMM

  • Nicolas Montauban
  • Application Security, OWASP, Security

In the dynamic digital realm, security is not a luxury, it is an imperative. As[…]

Read Article
Teamwork makes the dream-work!

20

Mar

Codific’s Christmas CTF Challenge Event

  • Michaella Masters
  • Security

A Fun Way to Enhance Team Building Key Takeaways: CTF games offer a dynamic platform[…]

Read Article
Privacy threat modeling and data privacy

02

Jan

What is privacy threat modeling? A conversation with two experts

  • Nicolas Montauban
  • Application Security, Security
Have you ever wondered about the initial steps to ensure data privacy? Do you ever[...]
Read Article
GPDR compliance in software development

17

Jun

7 Key Principles for GDPR Compliance in Software Development

  • Nicolas Montauban
  • Security

In the era of data-driven innovation, software development plays a critical role in managing sensitive[…]

Read Article
SAMM: your map and itinerary in the security journey.

24

Jan

BSIMM vs SAMM: Which model is better?

  • Aram Hovsepyan
  • BSIMM, SAMM, Secure Software Development, Security, Software security
Application security has been a hot topic for decades. It was a buzzword in 2001,[...]
Read Article
Previous

Building a simple and safe digital future

This website runs on green hosting - verified by thegreenwebfoundation.org
  • Visit Codific's LinkedIn channel (opens in a new tab)
  • Visit Codific's YouTube channel (opens in a new tab)
  • Spotify

Main Focus

Application Security Compliance Cybersecurity NIST SSDF OWASP OWASP SAMM Privacy by Design SAMM Secure Software Development Security Software security SSDLC

Recent Post

  • Claude Code Security Excerpt

    February 24, 2026

    Claude Code Security: Will AI Disrupt Application Security?

    February 24, 2026

  • Secure Controls Framework Illustration

    January 31, 2026

    Secure Controls Framework: A Comprehensive Overview

    January 31, 2026

  • Security scopes

    December 31, 2025

    NIST SSDF 1.2 Explained

    December 31, 2025

In the Spotlight

  • SAMMY
  • The AppSec Management Podcast
  • Secure Video Sharing with Videolab
  • Attendance Radar
  • SARA
  • Terms & Conditions
  • Imprint
  • Cookie Policy
  • Privacy Statement

Codific ® 2025. All rights reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}