Managing AppSec

When your application security program is up and running, you need best-practice advice on managing and growing the program. Our security experts will guide you through important steps like measuring the success of your program or expanding it to cover more of the application landscape.

Maximizing the Bang for Your Security Training Buck

eschuman's picture
By Evan Schuman June 8, 2018
Learn more about AppSec training from our VP of engineering.

Training developers on application security is critical to the success of every security program, but many companies deploy training improperly or insufficiently, argues Maria Loughlin, VP of Engineering at CA Veracode. Companies can increase the bang for their training buck by matching their training delivery and curriculum to the needs of their organization. Consider the channel A successful... READ MORE

What the CA Veracode Verified Team Tier Looks Like

sciccone's picture
By Suzanne Ciccone June 5, 2018
A closer look at the CA Veracode Verified Team tier

We recently announced our CA Veracode Verified program. To better suit the needs of organizations that are producing and updating apps at DevOps speed, we are attesting to the security of the overall development process of an application, rather than to the security of an application at one point in time. In this way, your prospects and customers can rest assured that security was... READ MORE

IT Is Finally Embracing DevSecOps

eschuman's picture
By Evan Schuman May 31, 2018
Why the shift toward DevSecOps is picking up speed

It’s taken quite some time to get here, but enterprise IT execs are finally embracing DevSecOps. The latest indicator that it’s happening is the 2018 Gartner Magic Quadrant for Application Security Testing, which predicted in March that “by 2019, more than 50% of enterprise DevOps initiatives will have incorporated application security testing (AST) for custom code, an increase from fewer than 10... READ MORE

Optimizing Your Approach to Securing Software Components

Neil's picture
By Neil DuPaul May 30, 2018  | Managing AppSec

The business world increasingly runs on software. It's on computers, in machines and embedded in almost every electronic device available. Today, the typical enterprise runs 372 mission critical applications. Remarkably, data shows that 75 percent of third-party applications don’t comply with OWASP Top 10 security policies, and 97 percent of all scans identify at least one component with a known... READ MORE

[VIDEO] Top 5 Tips on Application Security Policies

sciccone's picture
By Suzanne Ciccone May 2, 2018
Tips on improving your AppSec policy

Policies are a critical part of your application security program; you need them to frame your program, set goals, measure success, and report on progress. But they can also stall your program if they work against, and not with, developer processes and priorities. With the shift to DevOps, and developers working in a faster and more incremental way, it might be a good time to ensure your policy... READ MORE

What the CA Veracode Verified Standard Tier Looks Like

sciccone's picture
By Suzanne Ciccone April 30, 2018
What the Standard Verified Tier looks like

We recently revamped and relaunched our CA Veracode Verified program. To better suit the needs of organizations that are producing and updating apps at DevOps speed, we are moving away from attesting to the security of an application at one point in time, and, rather, attesting to the security of the overall development process of an application. In this way, your prospects and customers can rest... READ MORE

Customer Success Story: Why CAP COM Chose CA Veracode

gcoleman's picture
By Gregg Coleman April 18, 2018  | Secure Development
Banking and Finance AppSec

When you work in the banking industry, security is a part of everything you do. And just as important as protecting the money is protecting the integrity of the software it all flows through. But for us at CAP COM Federal Credit Union (CAP COM), ensuring that we were producing secure code had become a bigger priority. As part of redefining our software development lifecycle (SDLC), CAP COM began... READ MORE

Looking Ahead to RSA: What You’ll See at Booth N3309

SKing's picture
By Sam King April 12, 2018  | Managing AppSec
Find out what we're highlighting at RSA this year.

RSA 2018 is fast approaching, and all of us at CA Veracode are gearing up and getting ready. I’m excited to return this year, and looking forward to both sharing what’s new with us, and learning more about what others have been working on this year. Although the size of this conference can be overwhelming, bringing so many security professionals together creates a truly unique source of knowledge... READ MORE

Survey: How Teams are Using Software Components in the Age of DevOps

Neil's picture
By Neil DuPaul April 10, 2018  | Managing AppSec
Software component security.

New research: Only 52% of developers using components in their apps update them when a new vulnerability is announced Open source components have gone mainstream. With every company undoubtedly becoming a software company, open source and commercial components are a vital element in developing applications at the speed of DevOps. But while they’re a powerful tool for adding features and... READ MORE

It’s Complicated - Operational Security for Developers

pherzog's picture
By Pete Herzog March 28, 2018  | Managing AppSec
Application porosity - opsec for developers

The life of a commercial software developer is a difficult one. Or at least we have to assume it is because of how many of them half-ass it when code starts to get complicated. Okay, maybe that’s unfair. Maybe it’s not all half-assing. It’s complicated. Literally. There’s many functions that are overly complex. They are so complex with so many variables and interactions as to be actually... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.

 

 

 

contact menu