Secure Development

We'll walk you through the critical step of integrating security into the software development lifecycle (SDLC). You'll hear from the experts on everything from working with developers, to the best ways to assess code for security and the latest development trends and technologies.

What Security Pros Will Get Out of Our Summer 2018 Virtual Summit

sciccone's picture
By Suzanne Ciccone July 5, 2018
Get tips and advice on open source library use at our Virtual Summit.

There has been a fundamental shift in the way code is developed in the past 15 to 20 years. Today, developers do far more re-using of existing code than creating code from scratch. Taking advantage of the millions of open source libraries available has become standard operating procedure. And this new model comes with tremendous benefits – both for developers, and for the business – allowing both... READ MORE

How CA Veracode’s Integrations With Defect-Tracking Systems Enable DevSecOps

mkvitnitsky's picture
By Marina Kvitnitsky June 29, 2018
Details on CA Veracode's integrations with defect-tracking systems

Software development deadlines are getting shorter. Business requirements are getting more complex, and cybersecurity threats are becoming more real. According to the Accenture report on 2018 State of Cyber Resilience, the average number of targeted attacks has more than doubled between 2017 and 2018. The good news is that security teams are adapting to these constant threats, with the targeted... READ MORE

Optimizing Your Approach to Securing Software Components

Neil's picture
By Neil DuPaul May 30, 2018  | Managing AppSec

Don't miss our Virtual Summit on July 25-26: The Open Source Library Conundrum - Managing Your Risk The business world increasingly runs on software. It's on computers, in machines and embedded in almost every electronic device available. Today, the typical enterprise runs 372 mission critical applications. Remarkably, data shows that 75 percent of third-party applications don’t comply with OWASP... READ MORE

Infographic: Reining In Software Component Risk

Neil's picture
By Neil DuPaul April 25, 2018

Open source components have gone mainstream. With every company undoubtedly becoming a software company, open source and commercial components are a vital element in developing applications at the speed of DevOps. But while they’re a powerful tool for adding features and functionalities to applications in relatively short order, they also introduce remarkable security risks.  reigning-in-... READ MORE

Customer Success Story: Why CAP COM Chose CA Veracode

gcoleman's picture
By Gregg Coleman April 18, 2018  | Secure Development
Banking and Finance AppSec

When you work in the banking industry, security is a part of everything you do. And just as important as protecting the money is protecting the integrity of the software it all flows through. But for us at CAP COM Federal Credit Union (CAP COM), ensuring that we were producing secure code had become a bigger priority. As part of redefining our software development lifecycle (SDLC), CAP COM began... READ MORE

Survey: How Teams are Using Software Components in the Age of DevOps

Neil's picture
By Neil DuPaul April 10, 2018  | Managing AppSec
Software component security.

New research: Only 52% of developers using components in their apps update them when a new vulnerability is announced Open source components have gone mainstream. With every company undoubtedly becoming a software company, open source and commercial components are a vital element in developing applications at the speed of DevOps. But while they’re a powerful tool for adding features and... READ MORE

It’s Complicated - Operational Security for Developers

pherzog's picture
By Pete Herzog March 28, 2018  | Managing AppSec
Application porosity - opsec for developers

The life of a commercial software developer is a difficult one. Or at least we have to assume it is because of how many of them half-ass it when code starts to get complicated. Okay, maybe that’s unfair. Maybe it’s not all half-assing. It’s complicated. Literally. There’s many functions that are overly complex. They are so complex with so many variables and interactions as to be actually... READ MORE

Security Champions: a Scalable Approach for Securing DevOps

Neil's picture
By Neil DuPaul March 22, 2018

The enormous growth of DevOps is no accident. As organizations attempt to navigate the complexities of digital business, speed and flexibility are everything. Yet somewhere between innovation and disruption lies a basis fact: A DevOps initiative is only as good as the security framework that supports it. Unfortunately, many organizations focus on speed and precision at the expense of security.... READ MORE

Security: Create a Development Champion

sciccone's picture
By Suzanne Ciccone March 13, 2018  | Secure Development
how to create a development champion on the security team

We talk a lot about the need for development teams to create security champions. With the shift to DevOps – and the intersecting of development, security, and operations teams – development and security teams can no longer operate in their traditional silos. Each team needs to not only work closely together, but also have a much deeper understanding of each others’ pains, processes, and... READ MORE

Adopting a More Secure Approach to Containers

Neil's picture
By Neil DuPaul March 6, 2018
Container Security

The complexities of developing secure software aren't lost on anyone in the business world. One tool development teams have used to adapt to today's challenging environment is software containers, which allow applications to run reliably on different platforms and systems.   Today, organizations use containers to address a wide range of development and testing tasks. What's more, as... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.

 

 

 

contact menu