What Security Pros Will Get Out of Our Summer 2018 Virtual Summit

What Security Pros Will Get Out of Our Summer 2018 Virtual Summit

There has been a fundamental shift in the way code is developed in the past 15 to 20 years. Today, developers do far more re-using of existing code than creating code from scratch. Taking advantage of the millions of open source libraries available has become standard operating procedure. And this ... Read More
What the CA Veracode Verified Continuous Tier Looks Like

What the CA Veracode Verified Continuous Tier Looks Like

We recently announced our CA Veracode Verified program. To better suit the needs of organizations that are producing and updating apps at DevOps speed, we are attesting to the security of the overall development process of an application, rather than to the security of an application at one point in ... Read More
A Closer Look at the CA Veracode SourceClear Solution

A Closer Look at the CA Veracode SourceClear Solution

The days of developers creating every line of code from scratch are over. The intense demand for newer, better software means development speeds have become correspondingly intense. In turn, developers need to rely on the pre-built functionality in open source libraries to keep up. The problem with this practice is ... Read More
Announcing the GA Release of SourceClear Custom Policies

Announcing the GA Release of SourceClear Custom Policies

We are very excited to announce the GA release of SourceClear Custom Policies. Custom Policies improves issue remediation and allows you to take greater control of your software delivery workflow. Why Do You Need Custom Policies? More than ever, development groups are relying heavily on open source software libraries to ... Read More
What the CA Veracode Verified Team Tier Looks Like

What the CA Veracode Verified Team Tier Looks Like

We recently announced our CA Veracode Verified program. To better suit the needs of organizations that are producing and updating apps at DevOps speed, we are attesting to the security of the overall development process of an application, rather than to the security of an application at one point in ... Read More
[VIDEO] Top 5 Tips on Application Security Policies

[VIDEO] Top 5 Tips on Application Security Policies

Policies are a critical part of your application security program; you need them to frame your program, set goals, measure success, and report on progress. But they can also stall your program if they work against, and not with, developer processes and priorities. With the shift to DevOps, and developers ... Read More
What the CA Veracode Verified Standard Tier Looks Like

What the CA Veracode Verified Standard Tier Looks Like

We recently revamped and relaunched our CA Veracode Verified program. To better suit the needs of organizations that are producing and updating apps at DevOps speed, we are moving away from attesting to the security of an application at one point in time, and, rather, attesting to the security of ... Read More
Podcast: AppSec's Effect on the Bottom Line

Podcast: AppSec’s Effect on the Bottom Line

Traditionally, most executives have thought of security as a necessary evil – an investment that was needed solely to avoid a bad outcome, but not something that would bring in new customers or boost revenue. But that seems to be changing. CA Technologies recently surveyed IT and business leaders to ... Read More
Do IT Pros Consider Security When Purchasing Software?

Do IT Pros Consider Security When Purchasing Software?

Traditionally, security was about cost avoidance. It was thought of like insurance – something you have to have in case something bad happens, but not something that would boost the bottom line or attract customers. But in today’s environment, we are increasingly seeing that security is about more than cost ... Read More
Security: Create a Development Champion

Security: Create a Development Champion

We talk a lot about the need for development teams to create security champions. With the shift to DevOps – and the intersecting of development, security, and operations teams – development and security teams can no longer operate in their traditional silos. Each team needs to not only work closely ... Read More
Loading...