All Research Sponsored By:Veracode, Inc.

Anatomy of a Superhero Developer
WHITE PAPER: Hoping to be a Superhero Developer? Find out if you have the right powers and gadgets.
Posted: 24 May 2017 | Published: 24 May 2017


How to Make Security Part of Your Development Process
WEBCAST: Learn how to seamlessly engage security teams in the development process to assess for risks earlier and often.
Posted: 24 May 2017 | Premiered: May 24, 2017


How To Get The Best Out of DevSecOps: Developer Perspective
WEBCAST: Learn the challenges and benefits of a DevSecOps approach from a developer's point of view.
Posted: 24 May 2017 | Premiered: May 24, 2017


How to Get the Best Out of DevSecOps: Operations Perspective
WEBCAST: A successful DevSecOps approach requires team integration. Find out what you need to know from an ops perspective.
Posted: 24 May 2017 | Premiered: May 24, 2017


Putting Security Into DevOps
WHITE PAPER: DevOps has disrupted software development and app security, in good ways. Learn its appeal and what problems it solves.
Posted: 24 May 2017 | Published: 24 May 2017


Secure Agile Development: Why Can't We All Get Along?
WEBCAST: Hear a discussion on how agile development increases efficient collaboration and the effectiveness of security testing.
Posted: 24 May 2017 | Premiered: May 24, 2017


Automate Security Into Your DevOps Pipeline
DATA SHEET: Find out how to quickly bring applications to market without sacrificing security.
Posted: 24 May 2017 | Published: 24 May 2017


Showing Your Skills: How to Become a Star Developer
DATA SHEET: Developer jobs are expected to grow 17% through 2024. Learn the latest skills needed and set yourself up for success.
Posted: 24 May 2017 | Published: 24 May 2017


Secure DevOps Survival Guide: A Field Manual for Developers
WHITE PAPER: Already know everything about software development but need help with DevOps and security? This manual is your guide.
Posted: 24 May 2017 | Published: 24 May 2017


Secure Agile & DevOps: How It Gets Done
WEBCAST: Hear from Adrian Lane, CTO of Securosis, and Chris Wysopal, CTO/CISO of Veracode, on building secure applications.
Posted: 24 May 2017 | Premiered: May 24, 2017


The Developer's Guide to the DevSecOps Galaxy
WHITE PAPER: Last year application-layer attacks were the leading cause of data breaches. Protect your organization with DevSecOps.
Posted: 24 May 2017 | Published: 24 May 2017


How To Leverage DevOps Trends To Strengthen Applications
WHITE PAPER: DevOps release apps faster than security teams are able to accommodate. Engage security pros or forego app protection.
Posted: 24 May 2017 | Published: 24 May 2017


Secure Agile Development
WHITE PAPER: Software development has changed over the past 15 years. Learn the evolution of agile development and where it is today.
Posted: 24 May 2017 | Published: 24 May 2017


How to Resolve a Web Application Security Vulnerability
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017


Application Development Security Requires Forethought
EGUIDE: Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
Posted: 22 May 2017 | Published: 18 May 2017


Resolve Web Security Issues with Industry Experts' Advice
EGUIDE: Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
Posted: 22 May 2017 | Published: 18 May 2017


The Impact of Data Breaches: Why Application Security is a Business Imperative
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014


Webinar: Why Benchmark Application Security?
TRANSCRIPT: Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.
Posted: 19 Aug 2014 | Published: 19 Aug 2014


Webinar: When is Application Security Done?
TRANSCRIPT: Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.
Posted: 19 Aug 2014 | Published: 19 Aug 2014


ROI Case Study: Cloud-Application Security Service
CASE STUDY: A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.
Posted: 19 Aug 2014 | Published: 19 Aug 2014


Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
CASE STUDY: A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.
Posted: 18 Aug 2014 | Published: 18 Aug 2014


Case Study: How a Global Bank Addressed App Security and Lowered Costs
CASE STUDY: A global leader of major banks mandated a new top-down approach to reduce application-layer risk throughout its global software infrastructure. View this case study to see how a security solution helped this bank assess their security needs and reduce the opportunity for exploitation.
Posted: 14 Aug 2014 | Published: 14 Aug 2014


Magic Quadrant for Application Security Testing
ANALYST REPORT: Choosing the right software security testing tool can be an overwhelming process. In this Gartner report, make your decision a little easier with a comparison of the top app security testing vendors on the market, including IBM, HP, Veracode, Aspect, and more.
Posted: 03 Jul 2014 | Published: 02 Jul 2013


Expert guide to understanding SaaS and cloud computing issues
EGUIDE: This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.
Posted: 21 Dec 2011 | Published: 21 Dec 2011


State of Software Security Report Volume 4
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011