Secure Coding Urban Myths and Their Realities

Secure Coding Urban Myths and Their Realities

???Science and technology revolutionize our lives, but memory, tradition, and myth frame our response.??? ??? Author Arthur M. Schlesinger Urban myths rely on their communities of origin to thrive and survive. Perpetuated by offhand anecdotes, sensational news stories, and friend-of-a-friend legends, urban myths about secure coding are no different; as ... Read More
Veracode Hacker Games: The Results Are In!

Veracode Hacker Games: The Results Are In!

|
The first everツ?Veracode Hacker Gamesツ?competition hasツ?come to a close, but were the flaws inツ?favor of our brave competitors? Read on to find out.ツ? Over the course of the two-weekツ?challenge, students from several universities in the U.S. and the U.K. came together to explore vulnerabilities and threatsツ?that they???ll one day face ... Read More
We’re All WFH Too – One Year Later!

We’re All WFH Too – One Year Later!

|
Last year brought a lot of change. Companies across the globe had to pivot, ready or not, and many went fully remote just like we did here at Veracode. 2020 transformed the way we work and communicate, changed how we raise our families and celebrate holidays, and even inspired us ... Read More
Putting the Sec in DevSecOps

Putting the Sec in DevSecOps

Whether a seasoned professional or a fresh computer science grad, every developer has his or her stressful moments of trying to dig through scanning results to mitigate or remediate a vulnerability. Since you work at the speed of ???I need this yesterday,??? it???s a hassle to slow down and fix ... Read More
Announcing the First-Ever Veracode Hacker Games

Announcing the First-Ever Veracode Hacker Games

|
???Destroying things is much easier than making them.??? This quote from The Hunger Games rings true in software; developers spend months perfecting their innovative applications only to see it all crumble at the nimble fingers of a speedy cyberattacker. So how do you beat them? Improve your secure coding know-how ... Read More
Embracing the Digital Shift: Implementing DevSecOps in the Cloud with AWS

Embracing the Digital Shift: Implementing DevSecOps in the Cloud with AWS

|
To keep up with increasing time and productivity demands in software development, it???s important that organizations are staying on top of their digital shifts through rapid technology adoption and the prevention of common snags in application security (AppSec). Developers must be enabled to create quality, secure code from the start ... Read More
Customer Q and A: Advantasure Developers Talk AppSec

Customer Q and A: Advantasure Developers Talk AppSec

|
Before selecting Veracode, Advantasure, a leader in the healthcare technology industry, was on the hunt for an AppSec program that would not only protect them against cyberattacks, but also prove compliance with laws and regulations in several states. After integrating Veracode???s solutions and methodologies into their software development process, Advantasure ... Read More
Is Your Language of Choice a Major Flaw Offender?

Is Your Language of Choice a Major Flaw Offender?

|
In volume 11 of our annual State of Software Security (SOSS) report, we uncovered some valuable nuggets of information about how you, the innovative developers of our world, can craft more secure code. For example, did you know that scanning via API improves the time to remediate 50 percent of ... Read More
State of Software Security v11: Key Takeaways for Developers

State of Software Security v11: Key Takeaways for Developers

|
We recently released volume 11 of our annual State of Software Security (SOSS) report, which analyzes the security activity and history of applications Veracode scanned during a one-year period. Giving us a view of the full lifecycle of applications, that data tells us which languages and vulnerabilities to keep an ... Read More
Healthcare Orgs: What You Need to Know About TrickBot and Ryuk

Healthcare Orgs: What You Need to Know About TrickBot and Ryuk

|
In late October, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) co-authored an advisory report on the latest tactics used by cybercriminals to target the Healthcare and Public Health (HPH) sector. In the report, CISA, FBI, ... Read More

Secure Guardrails