Webinars

secure-software-resource.png

Build Secure Software And Manage Application Risk With The Veracode Platform

sans-webinar-resource.png

A Buyer's Guide to Dynamic Scanning to Secure Web Applications

beyond static analysis

Beyond Static Analysis: Securing Your Application Portfolio with DevOps

Veracode Web Application Scanning Demo

How to Tackle Security in the CI/CD Pipeline

dev friendly security resource

Developer-Friendly Security with Veracode Greenlight

It’s Not All Gloom and Doom: Security and Development Are More Aligned Than Ever

Gain Visibility into your Open Source Risk with Veracode Software Composition Analysis

code compliance resource

How To Ensure Your Code Meets Quality Compliance

Five Lessons Learned from Petya and WannaCry

The Top 4 Ways Vulnerabilities Get Into Your Software

How to Keep the Peace Between Security and Development

Application Security in a DevOps World

Full-Spectrum Engineering Webinar

Integrating Application Security Into The Tools You Already Use

Be the Champion of Security in a DevOps World

Using Dynamic Scanning to Secure Web Apps in Development and After Deployment

Choosing right path to appsec resource

Choosing the Right Path to Application Security

Secure devops resource

Getting Started with Secure DevOps

NYC Cyber Security

NY DFS Cybersecurity Regulations: What You Need to Know

conquering-the-mountain-of-security-debt-resource

Conquering the Mountain of Security Debt

5 keys to building resource

Your Chance to Get It Right: 5 Keys to Building AppSec into DevOps

Strutshock Webinar

Struts-Shock: Current Attacks Against Struts 2 and How to Defend Against Them

Devops Regulated

How Do You Apply DevOps in a Regulated Environment?

Best DevOps

How to Get the Best Out of DevSecOps – From Operations’ Perspective

Human Side Resource

The Human Side of DevSecOps

Increasing software security resource

Increasing Software Security Up and Down the Supply Chain

Best out of devsecops

How To Get The Best Out of DevOps - Security's Perspective

AppSec Financial Resource

Application Security Within The Financial Market

How To Get The Best Out Of DevSecOps - Developer Perspective

Best practices Infosecurity Group

How to Achieve Best Practice in Application Security in 2017

Identifying and Remediate Vulns resource

Identifying Vulnerabilities Hidden in Your Applications

continuous security webinar resource

How Feasible is Continuous Security?

yahoo breach webinar resource

Yahoo! A Breach Too Far or the Reality of Consumer Privacy in 2016?

state of appsec resource

The State of Application Security Practice 2016

appsec bytes resource

AppSec Tutorial: Cross Site Scripting

beyond deployment resource

Beyond Deployment Velocity: How Technology and Process Increase the Likelihood of a Successful, Secure DevOps Initiative

security dev process resource

How to Make Security Part of Your Development Process

great debate

The Great Debate: The State of Application Security

How Do Vulnerabilities Get Into Software?

revealing truths myths and realities resource

Revealing the Truth Behind Software Security Myths and Realities

sc magazine webinar

Selecting an Application Security Testing Vendor

badlock what you need to know header

Badlock: What You Need to Know

sans getting started webinar resource

SANS Webinar: Getting Started with Web Application Security

metrics pyramid resources widget

Benchmarking AppSec: A Metrics Pyramid

how apps self protect resource widget

How Your Applications Can Protect Themselves from Cyberthreats

sans why need appsec program

SANS - Why You Need Application Security

Understanding and Responding to IT Security Vulnerabilities

Understanding and Responding to IT Security Vulnerabilities

Build Your Software Securely

Build Your Software Securely

XML Resource

Exploiting XML Entity Vulnerabilities - Black Hat Webcast Series

Pages

 

 

contact menu