New Data Reveals How AppSec Is Adapting to New Development Realities

New Data Reveals How AppSec Is Adapting to New Development Realities

In today???s fast-paced world, companies are racing to bring new, innovative software to market first. In order to keep up with the speed of innovation, many organizations are shifting toward DevSecOps. DevSecOps brings security to the front of the software development lifecycle, allowing for both fast deployments and secure applications ... Read More
Why is Dynamic Analysis an Important Part of You AppSec Mix?

Why is Dynamic Analysis an Important Part of You AppSec Mix?

By now, most are familiar with the concept of DevSecOps. With DevSecOps, application security (AppSec) is moved to the beginning of the software development lifecycle (SDLC). By scanning earlier in the SDLC, you are able to find and fix flaws earlier. This can result in significant time and cost savings ... Read More
The Texas Cybersecurity Act: What You Need to Know

The Texas Cybersecurity Act: What You Need to Know

Texas passed House Bill 8 relating to cybersecurity for state agency information resources. The bill sets mandatory practices for state agencies, institutes continuous monitoring and auditing of network systems, adds protections for student data privacy, and updates the penalties for cybercrimes. As Texas House Speaker, Joe Straus, commented, state agencies ... Read More
Your 30-60-90 Day AppSec Plan

Your 30-60-90 Day AppSec Plan

Your stakeholders have signed off on an application security program, you???ve selected a vendor ??ヲ ツ?but now what? There is no detailed handbook or instruction manual for getting started because every organization is different. You need to formulate your own plan to make sure the program meets the individual needs ... Read More
Understand the Past to Shape the Future of AppSec

Understand the Past to Shape the Future of AppSec

It can sometimes feel like development and security teams are working toward two separate goals. Both developers and security professionals are supposed to be working toward timely, secure releases, but in reality, developers tend to prioritize speed and function, and security professionals prioritize security measures. How can you unify the ... Read More
Making a Case for the Cloud: Customers Give Their Honest Feedback of SaaS-Based AppSec

Making a Case for the Cloud: Customers Give Their Honest Feedback of SaaS-Based AppSec

Before the pandemic, 70 percent of companies were in the early stages of a digital transformation. But given the current circumstances, companies are being forced to speed up those efforts. This statistic, coupled with the FBI???s findings that cyberattacks have increased by 400 percent over the last few months, supports ... Read More
Open Source Libraries: Uncovering the Risks That Lurk Beneath the Surface

Open Source Libraries: Uncovering the Risks That Lurk Beneath the Surface

The use of open source libraries to assemble applications is accelerating. Not only are more people using open source libraries, but more individual developers, and even companies, are also on a mission to contribute to more open source projects. For Veracode, we???re seeing more than 70 percent of our customer ... Read More
Cracking the Code to a Successful Remediation Plan

Cracking the Code to a Successful Remediation Plan

Creating a remediation plan can be tricky. In fact, customers often tell us that it???s much easier to create a plan to help developers scan applications quickly and easily than it is to establish remediation goals. But if vulnerabilities aren???t remediated right away, there???s a higher chance that they will ... Read More
Verizon Data Breach Investigations Report Finds an Increase in Web Application Breaches

Verizon Data Breach Investigations Report Finds an Increase in Web Application Breaches

Verizon recently published its 2020 Data Breach Investigations Report (DBIR), which analyzed 32,002 security incidents in 16 different industries and four different world regions. Similar to last year???s findings, the majority of breaches ??? 86 percent ??? are financially motivated, and most ??? 70 percent ??? are caused by outsiders ... Read More
Veracode’s Leslie Bois and Robin Montague Earn Recognition on CRN 2020 Women of the Channel List

Veracode’s Leslie Bois and Robin Montague Earn Recognition on CRN 2020 Women of the Channel List

Leslie Bois, Veracode???s Vice President of Global Channels and Alliances, and Robin Montague, Veracode's National Partner Director, have been recognized on the esteemed CRNツ?2020 Women of the Channel list. The annual list recognizes a select group of high-achieving women for their contributions to channel advocacy, growth, thought leadership, and dedication ... Read More
Loading...