Read the "Magic Quadrant For Application Security Testing" (August 2015) to learn whether your organization has the right technologies and processes to effectively reduce application-layer risk across the enterprise.Download the report
Veracode’s latest "State of Software Security" report provides analytics from our cloud-based platform that benchmark the application-layer risk profile for seven vertical markets across 34 industries.Download the report
Speed your software to market – securely – without hiring an army of AppSec experts. Take advantage of our cloud-based architecture to implement consistent policies and metrics across disparate development teams, no matter where they’re located.Find out more
Join Jim Nelms, CISO of The Mayo Clinic and Chris Wysopal, CTO & CISO of Veracode in a 5-minute video as they discuss the changing role of the CISO and how the importance of that role is growing within the organization.
Simplify application security with a single central platform for multiple assessment techniques including static analysis, dynamic analysis and software composition analysis, plus manual penetration testing.
Using data from the thousands of web applications we’ve assessed, our customized tool will help you estimate how many websites you actually have, and how many vulnerabilities they contain.
Security experts discuss the four metrics they use to measure the success of their appsec programs.
Two of the industry’s best-known voices discuss why cyberattacks can now impact our physical assets and safety.
Learn how to evolve the role of the CISO to help promote innovation rather than holding it back.
Dyre Trojan Uses Semi-Random File Names to Evade Detection | http://t.co/jVUWQBBvAP
Breaking Down HIPAA, PCI DSS and Third-Party Risk Management - http://t.co/QohDgbW5KE
Cyberespionage: The Most Dangerous Cyberthreat - http://t.co/pMd5gNacmD
Netflix Is Dumping Anti-Virus, Presages Death Of An Industry - Forbes - http://t.co/HTw4RApH8O
Dyre Trojan Uses Semi-Random File Names to Evade Detection - http://t.co/1dFFV7dWiA
A Secure Application Layer Can Prevent Disaster - http://t.co/DGOyELxlH5
SOS: Security Remediation and the Future of Training - http://t.co/LkFiIFosLs
RT @jlavepoze: "It's easy to say this is a horrible processes and we need to fix it. temptation is to redesign. Should take incremental ste…
RT @jlavepoze: "developing faster can create lower quality code, unless there is continuous assessment process. Sec has to fit into that mo…
RT @jlavepoze: "At the end of the day, CISOs have the last word on nothing. Our job is to advise on how to do some thing as safely as possi…
AshleyMadison: $500K Bounty for Hackers — Krebs on Security - http://t.co/sg585mJXJr
RT @jlavepoze: "#1 skill board experts from a CISO is still technical skills. But also expect them to understand the biz and have comm skil…
RT @jlavepoze: "boards want to hear you have a strategy, and understand when everything goes south, you have a team who is prepared to resp…
Ashley Madison data dump reveals emails, source code for websites | Computerworld - http://t.co/x2lv0rZ34F
LG phones most exposed to new Certifi-gate vulnerability | CSO Online - http://t.co/EEe91FFHaN
Leaked AshleyMadison Emails Suggest Execs Hacked Competitors — Krebs on Security - http://t.co/sjwSvUgG0X
Beyond the Quadrant: What the 2015 'Gartner Magic Quadrant for AST' Says About the AppSec Market - http://t.co/N64KX5rFxo
Threat Intelligence Sharing: Is Your Enterprise Ready? - http://t.co/YG4tDEv7Iq
Startups in the Forefront of Battle Against Hackers - WSJ - http://t.co/AulARgUMZv
Are CISOs Spending Too Much Time Focusing on Technology? - http://t.co/Rqvohkusgu
RT @wallofsheep: Companies can now be sued for unreasonably and unnecessarily exposing consumers information via weak IT Security! http://…