Hacking and Piracy. Aaargh!!

Are APT hacking crews just modern day buccaneers? And, if so, how do we make them walk the plank?

When it comes to matters of information security, I’m a big fan of what might be called the “anti-exceptionalism” school of information security. That is: I reject the notion that the myriad of problems that we, the IT community, face in regard to security our networks, endpoints and the Internet are exceptional or extraordinary in any way.

Twitter Two-Steps Harder Than a Skrillex Show on Ice

Nothing’s free in this world, especially not when it comes to security. With Twitter officially cramping your style, you are now forced you to waste precious seconds you could be tweeting, by instead waiting for a verification code to be delivered to your phone just so you can login.

An AppSec Speed Bump On The Road To The Future

The Internet of Things is upon us. We’re at the dawn of a new era – with changes afoot that may be even more revolutionary than the advent of the commercial Internet. There’s just one big obstacle in the way: application security.

Upcoming Webinars: May 2013

We have a rich history of running webinars at Veracode but it seems that recently we’ve been doing more in house and via partner channels. Going forward you’ll see a monthly update like this post detailing all our anticipated online events to hopefully make you aware of our webinars sooner and help you plan for attendance if you’re interested. Without further ado here’s the slate of webinars for the remainder of May!

How Do You Influence the Security Posture of Your Business’s Third-party Applications?

I recently came across an interesting blog post by a team member at Acunetix that addressed a challenge many enterprises are facing when it comes to securing third-party components. This is a pretty hot topic in certain circles these days, and understandably so – studies have suggested that as many as 65% of an enterprise’s mission critical applications are developed externally. Additionally, Veracode research shows that a typical internally developed applications contains somewhere between 30% and 70% of externally developed code, indicating that even internally developed apps are utilizing code originating outside of their own walls.

#TalkingCode: Ask Chris Wysopal and Josh Corman Your Questions

Tomorrow Veracode co-founder and CTO/CISO Chris Wysopal, and Josh Corman co-founder of Rugged Software and Director of Security Intelligence at Akamai Technologies will be filming a video segment with Paul Roberts of The Security Ledger. The trio will be chatting about a variety of topics trending in the Appsec field including but not limited to; recent changes to the OWASP Top 10, security of third party software components, and industry culture.

1 17 18 19 20 21 68