Continues Strategy of Incorporating Complementary Technologies via Open and Extensible Platform
IDG study reveals that lack of visibility into application-layer risk is consistent across US, UK and German firms
Veracode’s security team probed and monitored a set of always-on, consumer IoT devices, plus their associated mobile applications and cloud services, to understand the impact of each product’s data security and privacy posture. The results show vulnerabilities within these devices to be a potential pathway for robbery, theft of sensitive data or even stalking.
Mobile enterprise environments increasingly targeted by embedded spyware, adware and back-doors, according to analytics from Veracode’s cloud-based security platform
80 percent of vulnerable applications rated as highly business-critical, according to analytics from Veracode’s cloud-based security platform
Evaluation cites “unified cloud-based security SAST and DAST platform” with “a customer-centric approach to integration into the greater development workflow”
Veracode has been selected as a finalist for BostInno’s 50 on Fire awards, an annual celebration of the 50 most luminary organizations driving innovation in Boston and beyond. Veracode joins other innovators including HubSpot, Acquia and Actifio.
Chris Wysopal, Veracode’s co-founder, CTO and CISO will be a panelist for the segment “IT Transformation is the New Normal” at the annual Argyle CISO Leadership Forum. The conference will discuss best practices for security organizations to help drive the business forward.
Chris Wysopal, Veracode’s co-founder, CTO and CISO will be a panelist for the discussion “The Digital Trust: The Technology of Trust,” a Bloomberg Government event on Thursday, November 13th. Produced in partnership with Visa, the discussion will address the notion that the digital economy is built on trust: that transactions are protected from fraud and crime, and that personal, business, and government data are used appropriately and stored securely.
Veracode introduces new cloud-based service that reduces enterprise risk via centralized, automated component governance
John Martin, COTS Security program manager for The Boeing Company, will present “The Boeing Case Study: How to Secure the Software Supply Chain” on Tuesday, June 24th at 2:45pm at the Gartner Security and Risk Management Summit. During this presentation, Martin will outline the steps Boeing took to implement a governance program for assessing the security of its third-party applications.
Research conducted by IDG revealed that 63 percent of enterprise applications are not assessed for security vulnerabilities. The reason the majority of these applications go untested is because securing web, mobile and third-party applications can be an inhibitor to getting these solutions market quickly – especially when using the traditional on-premises approach to application security.
Sam King, executive vice president of product strategy and corporate development, was selected by Mass High Tech as one of twenty Women to Watch in 2014. Mass High Tech’s Women to Watch award honors women who are both driven and influential leaders and mentors in the community.