Quantcast
Channel: RSS | Veracode Blog
Browsing all 780 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

2014: The Year of the Application Layer Breach

View Article



Image may be NSFW.
Clik here to view.

The Agile Development Environment and the Rise of Right-Angle Thinking

How do companies develop industry-leading apps? Often the answer lies in a horizontal, Agile development environment structured around team-based, iterative design over strict adherence to policy and...

View Article

Image may be NSFW.
Clik here to view.

Cloud Computing Trends: Fueling DevOps AppSec Integration

Cloud computing trends show this technology is on the way up: RightScale's new "2015 State of the Cloud Report" — as detailed by Market Wired — found 93 percent of organizations are already running...

View Article

Image may be NSFW.
Clik here to view.

An Unreported Crime: Cyber Security

The City of London Police have reported this week that banks are covering up the true extent of cybercrime, to the extent that only one in five crimes are actually reported.Many who have been working...

View Article

Image may be NSFW.
Clik here to view.

Do You Code Securely? Three Reasons You Must Say Yes.

You're a developer and you've heard the hype: Applications are the number one vector for cyberattacks. The volume of security incidents has grown 66 percent per year since 2009, and financial losses...

View Article


Image may be NSFW.
Clik here to view.

Finding the Risk Factor in IT Security for Small Business

Enterprises are the ideal targets for hackers. That's common wisdom, backed up by story after story about big banks and retailers getting breached. It makes sense: These organizations hold massive...

View Article

Image may be NSFW.
Clik here to view.

IoT security - Veracode study demonstrates the lack of security posture

The Internet of Things devices are everywhere, their diffusion is becoming capillary, but we must carefully consider the aspects related to the IoT security.Internet of Things is the paradigm that most...

View Article

Image may be NSFW.
Clik here to view.

The Independent Software Vendor Experience in ROI

It’s no surprise that large enterprises are increasingly looking to understand the security of their software suppliers – especially now that New York’s superintendent of financial services has...

View Article


Image may be NSFW.
Clik here to view.

How Third-Party Risk Management Makes Outsourcing Easy

It's no secret that third-party vendors are the backbone of software development. Positions are being created at a record pace while the roles behind them continue to drill down into more specific...

View Article


Image may be NSFW.
Clik here to view.

Transport for London Doubles Mobile Tablet Use, Freedom of Information...

More than 23,000 mobile devices issued to staff last year, a 48% increase in last five yearsThis week Veracode released figures obtained from Transport for London (TfL) which show that they have...

View Article

Even Anti-Virus Vendors Recognize the Need for AppSec

It is not uncommon for security vendors to release reports outlining the state of security. Verizon does it each year, and their report is seen as the authority on security statistics. Recently,...

View Article

Image may be NSFW.
Clik here to view.

Study: Risk Visibility Gap

Enterprises around the world rely on web and mobile apps to do business, yet basic security assessments of these applications are not consistently done. In a study we commissioned through IDG, more...

View Article

Image may be NSFW.
Clik here to view.

Mobile Apps: Welcome to the Wild West

In recent weeks, there has been a lot of talk about the phenomenon of hardware release cycles taking a toll on safe software development. Just as OS platform safety testing gets neglected in the mad...

View Article


Image may be NSFW.
Clik here to view.

The #VeracodeMonster Social Challenge at RSA Conference

We're bringing back our popular #VeracodeMonster photo challenge - and this time we're bringing all our Monsters to the party.Last year saw the debut of our social photo challenge, we had lanyards made...

View Article

Image may be NSFW.
Clik here to view.

The Proof (and Profit) of Security Audits Is in the Pudding

Software buyers are increasingly focusing on security as a requirement in the product they purchase. This is far from a bad thing — it's how these software buyers ensure their employees and customers...

View Article


Image may be NSFW.
Clik here to view.

The BMW Security Flaw, or Dude, Where's My Car?

Forget LoJack, it's 2015. If you want to protect your car — and your enterprise's secure data — it's about time you add it to the list of devices your AppSec program protects. The recent BMW security...

View Article

Image may be NSFW.
Clik here to view.

It's 2015 and I'm Still Not At RSA Conference

RSA is here again.  This year our crew is decked out in spiffy monster ties, sweater vests and cardigans.And here I am again, blogging from my cube.  As usual, I’m perusing the RSA site looking for...

View Article


Image may be NSFW.
Clik here to view.

AppSec is a Major Concern, But Still Not a Top Priority

Imagine this scenario; your brother tells you he is very concerned about the fact the brakes on his car haven’t been working right lately – but he just doesn’t have time to get to the mechanic. It is...

View Article

Image may be NSFW.
Clik here to view.

Make It So! Creating an Effective Security Policy

With all the breaches and cyberattacks in the news, your executives are probably asking you: "How can we make our application security policy more effective?"According to a recent Gartner report,...

View Article

Cyberespionage: Enterprise Nuisance or National Crisis?

According to President Obama, cyberespionage has crossed the threshold from "nuisance" to "national emergency." As reported byNational Journal, the president signed an order allowing the treasury...

View Article
Browsing all 780 articles
Browse latest View live




Latest Images