Introducing VAST: Vendor Application Security Testing

Navigating the security superhighway of application perimeters, vendor software and in house development efforts can be a complex and intimidating task. We aim to shift your efforts to the fast lane with our new program, VAST!

Today marks the official launch of our new Vendor Application Security Testing (VAST) program, designed to help enterprises manage the risks inherent in vendor-supplied software applications.

Third Party Application Analysis: Best Practices and Lessons Learned

This summer, Veracode Solutions Architect Chad Holmes presented a webinar on third party application analysis. The webinar recommended several best practices for enterprises, application vendors, and application analyzers to follow in the third party application analysis process. In this blog post we’ll highlight Chad’s best practices and the key takeaways from his presentation.

Gartner Security & Risk Management Summit: Where to Find Veracode

The annual Gartner Security & Risk Management Summit is a two-day event that brings Gartner analysts and the security and risk management community together in one location to discuss the latest research, insights and forward-thinking perspectives found nowhere else. The summit features five in-depth programs and more than 50 sessions. Veracode will be exhibiting and speaking at the Gartner Risk & Security Management conference in London, UK this week September 19-20.

WEBINAR: The Silent Assassins in Your Cyber Security Strategy

On today’s webinar, “Web & Mobile Applications: The Silent Assassins in your Cyber Security Strategy”, we will discuss the evolution of the application security perimeter with Erik Peterson, Veracode’s Director of Product Strategy. Erik will highlight how mobile devices and web applications are impacting security teams and present guidelines for addressing the changes to our […]

Could Your Domain Survive a DNS Attack?

Millions of web sites suddenly became unreachable on Monday due to severe DNS-related problems at GoDaddy. Whether this was the result of a hack, or an internal problem, or a combination of both remains a hot topic, but today we’re going to ask a more pragmatic question: Could your domain survive a DNS attack or […]

Discover Who’s Tracking You Online With Collusion

Internet privacy is a hot topic these days as advertisers are looking to make money off every bit of available data. There are increasing concerns over unsolicited tracking done by advertisers and website owners and recent legislation has shone a spotlight on the topic as well. Collusion is a great add-on for Firefox made by Mozilla that shows, in real time, how the data you share creates a spider-web of interaction between companies and other trackers.

Hackathon Feedback: A Look Towards December

After our latest Hackathon I wanted to get feedback from our various participants on what they thought of the event and what they thought could be improved. We came up with three simple questions and welcomed any answers at all. What you see below is a sampling of the responses we received.

Meet and Greet with Greg Nicastro

We recently met with Greg Nicastro, Executive Vice President, Product Strategy and Development here at Veracode. Greg is responsible for Veracode’s product and service offerings from market requirements through software development and SaaS delivery. He has more than 30 years of experience in the technology space, serving in executive leadership roles since 1997.

Avoiding Storms in the Cloud: The Critical Need for Independent Verification

This content was written by Chris Wysopal and originally published at infosecurity-magazine.com, you can read the full post by clicking here. Article Summary Last year, Forrester predicted that cloud computing would top $240 billion in 2020. Market Research Media came up with a more aggressive forecast of $270 billion in 2020. None of this data […]

Advice Regarding Recent Java Vulnerabilities

By now, our readers have undoubtedly seen the buzz about a serious security vulnerability in Oracle Java, with corresponding exploit code making its way around (in the form of active, in-the-wild attack campaigns, as well as penetration testing tools). If you haven’t, the gist is that, due to an issue in the way access control […]

1 26 27 28 29 30 64