The Agile Development Environment and the Rise of Right-Angle Thinking
How do companies develop industry-leading apps? Often the answer lies in a horizontal, Agile development environment structured around team-based, iterative design over strict adherence to policy and...
View ArticleCloud Computing Trends: Fueling DevOps AppSec Integration
Cloud computing trends show this technology is on the way up: RightScale's new "2015 State of the Cloud Report" — as detailed by Market Wired — found 93 percent of organizations are already running...
View ArticleAn Unreported Crime: Cyber Security
The City of London Police have reported this week that banks are covering up the true extent of cybercrime, to the extent that only one in five crimes are actually reported.Many who have been working...
View ArticleDo You Code Securely? Three Reasons You Must Say Yes.
You're a developer and you've heard the hype: Applications are the number one vector for cyberattacks. The volume of security incidents has grown 66 percent per year since 2009, and financial losses...
View ArticleFinding the Risk Factor in IT Security for Small Business
Enterprises are the ideal targets for hackers. That's common wisdom, backed up by story after story about big banks and retailers getting breached. It makes sense: These organizations hold massive...
View ArticleIoT security - Veracode study demonstrates the lack of security posture
The Internet of Things devices are everywhere, their diffusion is becoming capillary, but we must carefully consider the aspects related to the IoT security.Internet of Things is the paradigm that most...
View ArticleThe Independent Software Vendor Experience in ROI
It’s no surprise that large enterprises are increasingly looking to understand the security of their software suppliers – especially now that New York’s superintendent of financial services has...
View ArticleHow Third-Party Risk Management Makes Outsourcing Easy
It's no secret that third-party vendors are the backbone of software development. Positions are being created at a record pace while the roles behind them continue to drill down into more specific...
View ArticleTransport for London Doubles Mobile Tablet Use, Freedom of Information...
More than 23,000 mobile devices issued to staff last year, a 48% increase in last five yearsThis week Veracode released figures obtained from Transport for London (TfL) which show that they have...
View ArticleEven Anti-Virus Vendors Recognize the Need for AppSec
It is not uncommon for security vendors to release reports outlining the state of security. Verizon does it each year, and their report is seen as the authority on security statistics. Recently,...
View ArticleStudy: Risk Visibility Gap
Enterprises around the world rely on web and mobile apps to do business, yet basic security assessments of these applications are not consistently done. In a study we commissioned through IDG, more...
View ArticleMobile Apps: Welcome to the Wild West
In recent weeks, there has been a lot of talk about the phenomenon of hardware release cycles taking a toll on safe software development. Just as OS platform safety testing gets neglected in the mad...
View ArticleThe #VeracodeMonster Social Challenge at RSA Conference
We're bringing back our popular #VeracodeMonster photo challenge - and this time we're bringing all our Monsters to the party.Last year saw the debut of our social photo challenge, we had lanyards made...
View ArticleThe Proof (and Profit) of Security Audits Is in the Pudding
Software buyers are increasingly focusing on security as a requirement in the product they purchase. This is far from a bad thing — it's how these software buyers ensure their employees and customers...
View ArticleThe BMW Security Flaw, or Dude, Where's My Car?
Forget LoJack, it's 2015. If you want to protect your car — and your enterprise's secure data — it's about time you add it to the list of devices your AppSec program protects. The recent BMW security...
View ArticleIt's 2015 and I'm Still Not At RSA Conference
RSA is here again. This year our crew is decked out in spiffy monster ties, sweater vests and cardigans.And here I am again, blogging from my cube. As usual, I’m perusing the RSA site looking for...
View ArticleAppSec is a Major Concern, But Still Not a Top Priority
Imagine this scenario; your brother tells you he is very concerned about the fact the brakes on his car haven’t been working right lately – but he just doesn’t have time to get to the mechanic. It is...
View ArticleMake It So! Creating an Effective Security Policy
With all the breaches and cyberattacks in the news, your executives are probably asking you: "How can we make our application security policy more effective?"According to a recent Gartner report,...
View ArticleCyberespionage: Enterprise Nuisance or National Crisis?
According to President Obama, cyberespionage has crossed the threshold from "nuisance" to "national emergency." As reported byNational Journal, the president signed an order allowing the treasury...
View Article
More Pages to Explore .....