Part 3: Using Veracode From the Command Line in Cloud9 IDE

|
In part three of a four-part series, Clint Pollock, principal solutions architect at Veracode, details how to use Veracode from the command line in the Cloud9 IDE to submit a software composition analysis (SCA) scan. Check out the video and step-by-step instructions below. It’s Clint Pollock, principal solutions architect, back ... Read More

EWF Conference: Plotting the Course for Your Personal Brand

|
“Why focus on building your personal brand?”  This was the first question that Elana Anderson, Chief Marketing Officer at Veracode, asked during her presentation Plotting the Course for Your Personal Brand at the recent Executive Women’s Forum (EWF). Anderson, a lifelong student of marketing, and a former analyst at Forrester Research, has a deep understanding of the ... Read More

Champion Spotlight: Damian Sniezek

|
This interview was cross-posted from the Veracode Community. With his third consecutive championship in the Secure Coding Challenge – the monthly coding competition in the Veracode Community – Damian is the latest member of our community to be named a Secure Code Champion. After his win, we spoke with Damian ... Read More

Veracode Named Top 100 Women-Led Business in Massachusetts by the Commonwealth Institute and The Boston Globe

|
Veracode was recently recognized by the Commonwealth Institute and Boston Globe Magazine as a Top 100 Women-Led Business in Massachusetts. The honor, which was awarded to Veracode’s CEO, Sam King, is given to female leaders across multiple industries who are at the helm of Massachusetts’ most noteworthy companies. ​ Sam, ... Read More

Using Veracode From the Command Line in Cloud9 IDE

|
In part one of a four-part series, Clint Pollock, principal solutions architect at Veracode, details how to use Veracode from the command line in the Cloud9 IDE. Check out the video and step-by-step instructions below. Hello, Clint Pollock, principal solutions architect here to explain how to use Veracode completely from ... Read More

Champion Spotlight: Cris Rodriguez

|
This interview was cross-posted from the Veracode Community. Join us in congratulating Cris, the latest Secure Code Champion in the Veracode Community! The Secure Code Champion is an award that recognizes individuals with three championships in the Veracode Community’s Secure Coding Challenge competitions.   Cris is a principal-level Application Security engineer in a large ... Read More

Software Composition Analysis Mitigates Systemic Risk in the Popular NPM Repository

|
Chris Wysopal, Veracode Chief Technology Officer and Co-Founder, recently sat down to discuss the open source supply chain attack on the popular npm repository. Below is the transcript and corresponding video of his reaction.   Just a few days ago, we saw a classic open source supply chain attack where someone modified a JavaScript library, UA-Parser-JS, which is in the npm repository. The attackers modified the library to include password ... Read More

Cybersecurity Awareness Month: Top Trends Impacting Your Applications

|
It’s always important to take a pause to evaluate your software security – and what better time to do that than during Cybersecurity Awareness Month? To help get you thinking, we’ve compiled a list of cybersecurity trends that are happening now and will likely continue throughout the next several years.   ... Read More

MassTLC Names Sam King a Tech Top 50 Recipient

|
Sam King, CEO of Veracode, was recently named a Tech Top 50 recipient by the Mass Technology Leadership Council (MassTLC) for her exemplary leadership over the past twelve months. The Mass Technology Leadership Council (MassTLC), the region's leading technology association and premier network for tech executives, entrepreneurs, investors and policy leaders, recognizes tech companies and leaders for their ... Read More

The Aspen Cyber Summit: How Innovation Can Keep Us Safe

|
Is your organization concerned about systemic cyber risk? Sam King, Veracode CEO, recently participated in the Aspen Institute’s sixth annual Aspen Cyber Summit which put the spotlight on this issue. “Leaders in an organization, even those not responsible for infrastructure or security, should care about systemic risk because their ability to drive business results and their ability ... Read More