All resources sponsored by:

Veracode, Inc.

1 - 25 of 98 Matches
Financial Services Organizations
sponsored by Veracode, Inc.
WHITE PAPER:Nowadays, compliance plays a key role on software security – which makes it a topic of interest for heavily-regulated industries like financial services. Read this e-guide to learn more about the impact of compliance regulations of software security and discover the potential harm of threats like security debt and data leakage.
Posted: 22 Mar 2021 | Published: 22 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Evaluating and Selecting AppSec Vendors to Fit Your Business Needs
sponsored by Veracode, Inc.
RESOURCE:The application security (AppSec) market is oversaturated with an abundance of options, which can make finding an AppSec vendor/offering best fit for your unique needs a difficult task. Read this infosheet for some expert guidance to help get you started on your AppSec journey.
Posted: 22 Mar 2021 | Published: 22 Mar 2021
Get This Now


Communicating Application Security Success to Your Executive Leadership
sponsored by Veracode, Inc.
RESOURCE:For CISOs, illustrating the gravity of security metrics to non-technical folks can sometimes be tricky. This infographic provides a broad set of data points you should illustrate when trying to demonstrate the success of your application security program – read on to get started.
Posted: 22 Mar 2021 | Published: 22 Mar 2021
Get This Now

TOPICS:  Cybersecurity

SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
sponsored by Veracode, Inc.
RESOURCE:If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
Posted: 19 Mar 2021 | Published: 19 Mar 2021
Get This Now


Understanding Your Open Source Risk
sponsored by Veracode, Inc.
EBOOK:Developers are being asked to push out more software — and in shorter periods of time — than ever before. This has led to an increased reliance on open source libraries, and as this code is reused, it comes with a high risk of vulnerability. Access this e-book to learn more about the risks of open source and the challenges in securing it.
Posted: 19 Mar 2021 | Published: 19 Mar 2021
Get This Now


Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
EBOOK:Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.
Posted: 17 Mar 2021 | Published: 17 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Addressing Your Open Source Risk
sponsored by Veracode, Inc.
EBOOK:Open source risks are often unique to each organization – requiring them to understand and evaluate their current posture before they attempt to address the risks. Read this e-guide to learn the 3 evaluation questions you should ask yourself and discover how Veracode may be able to help your organization overcome its unique open source risks.
Posted: 17 Mar 2021 | Published: 17 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Understanding Modern Software Development
sponsored by Veracode, Inc.
RESOURCE:Download this resource to learn about how software development tools and processes changed recently, challenges developers run into while trying to balance these new tools and processes, and what security professionals can do to get developers fully on board with security.
Posted: 17 Mar 2021 | Published: 17 Mar 2021
Get This Now


Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER:Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.
Posted: 16 Mar 2021 | Published: 16 Mar 2021
Get This Now

TOPICS:  Cybersecurity

4 Ways to Increase Developer Buy-In of AppSec
sponsored by Veracode, Inc.
RESOURCE:Security developers have been doing their best to implement proper security measures, but since their performance is often tied to the rate of deployments, speed tends to take precedence.Access this article to learn about 4 steps you can take as a security professional to ensure that security doesn't take a backseat to speed.
Posted: 16 Mar 2021 | Published: 16 Mar 2021
Get This Now


Tips to Follow onYour AppSec Journey
sponsored by Veracode, Inc.
RESOURCE:Best practices don’t become best practices overnight. There are first steps to take for each, not least in application security. So for processes such as testing, shifting left and vulnerability management, how can you start? Access this infographic to learn 5 AppSec best practices and 5 practical first steps to each.
Posted: 15 Mar 2021 | Published: 15 Mar 2021
Get This Now


State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER:In their 11th official State of Software Security report, Veracode looks at what kind of impact the decisions developers make have on software security. Explore the top security concerns of the year—and learn how to navigate around them—here.
Posted: 03 Nov 2020 | Published: 03 Nov 2020
Get This Now


Veracode Security Labs
sponsored by Veracode, Inc.
WHITE PAPER:In order to help organizations enable their software developers to identify, remediate and prevent vulnerabilities, Veracode Security Labs provides comprehensive training for the most relevant application security topics of today. Read on to learn more about the program.
Posted: 11 Jun 2020 | Published: 11 Jun 2020
Get This Now


How to Deliver DevSecOps
sponsored by Veracode, Inc.
EGUIDE:Developer responsibilities are changing to include security—but DevSecOps doesn't have to be a drag. In this exclusive e-Guide, find 3 articles that explore how developers can implement security practices without adding to their workloads or their stress.
Posted: 11 May 2020 | Published: 11 May 2020
Get This Now


The Advantages of a SaaS-Based Application Security Solution
sponsored by Veracode, Inc.
RESOURCE:In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.
Posted: 07 May 2020 | Published: 07 May 2020
Get This Now


AppSec Best Practices vs. Practicality
sponsored by Veracode, Inc.
WHITE PAPER:When it comes to AppSec, teams must find a balance of best practices and practicality. Due to the realities of budgets, staff expertise, and time, not all best practices can be implemented successfully—but something is always better than nothing. In this guide, explore 5 key AppSec best practices and the practical steps your team can take now.
Posted: 07 May 2020 | Published: 07 May 2020
Get This Now


Securing the Entire Software Development Pipeline with Veracode Static Analysis
sponsored by Veracode, Inc.
WHITE PAPER:Developers need security testing solutions that can keep the pace with rapid, agile development processes. Traditional AppSec solutions can cause development to stall and delay the release of software. In this guide, learn how static analysis solutions can secure applications without hindering fast development.
Posted: 06 May 2020 | Published: 06 May 2020
Get This Now


State of Software Security: Volume 10
sponsored by Veracode, Inc.
WHITE PAPER:For the last decade, Veracode has been conducting studies and releasing annual reports regarding the current trends and challenges within software security. In this year’s edition, examine key statistics surrounding trending themes like compliance, security debt, scanning for flaws, and more. Read on to unlock the full report.
Posted: 06 May 2020 | Published: 06 May 2020
Get This Now


Industry and Financial Regulations: The Implications for Application Security
sponsored by Veracode, Inc.
WEBCAST:Today’s financial institutions face stringent regulations to ensure the responsible management and protection of sensitive user data. In this webinar, join Chris Wysopal, CTO and co-founder of Veracode, as they navigate the security and compliance implications of building and maintaining a mobile financial application.
Posted: 05 May 2020 | Premiered: May 5, 2020
Get This Now


How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER:Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 01 Apr 2020 | Published: 01 Apr 2020
Get This Now


AppSec: What not to do
sponsored by Veracode, Inc.
WHITE PAPER:Read on to learn the most common AppSec mistakes and the best practices that will lead your organization to success by avoiding those mistakes.
Posted: 11 Feb 2019 | Published: 11 Feb 2019
Get This Now

TOPICS:  IT Management

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER:Veracode analyzed more than 700,000 application scans, representing more than 2 trillion lines of code. Access this paper for a snapshot of what the data shows about the state of software security today.
Posted: 11 Feb 2019 | Published: 11 Feb 2019
Get This Now

TOPICS:  IT Management

Making Application Security Pay
sponsored by Veracode, Inc.
WHITE PAPER:Read this paper to learn how to maximize ROI on AppSec by measuring, proving, and amplifying the effects of AppSec.
Posted: 11 Feb 2019 | Published: 11 Feb 2019
Get This Now

TOPICS:  IT Management

Understanding Your Open Source Risk
sponsored by Veracode, Inc.
WHITE PAPER:Read this paper to learn how with the increasing use of open source libraries comes an increase in vulnerabilities and learn how Veracode can help prevent these vulnerabilities.
Posted: 11 Feb 2019 | Published: 11 Feb 2019
Get This Now

TOPICS:  IT Management

Cross Site Scripting
sponsored by Veracode, Inc.
WHITE PAPER:This paper explains how cross-site scripting (XSS) vulnerabilities give attackers the capability to inject client-side scripts into the application. Read on to learn how to prevent these vulnerabilities.
Posted: 11 Feb 2019 | Published: 11 Feb 2019
Get This Now

TOPICS:  IT Management

1 - 25 of 98 Matches
Page: 2 3 4 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences