7 Habits of Successful Supply Chain Transformations

Most enterprises today do not build all the applications they use. In fact, the majority of a typical enterprise’s application portfolio is developed by outside vendors. How can enterprises ensure the security of these outsourced or “third-party” applications? Simply assuming these apps are safe is no longer an option. 

Download now

Forrester CISO Handbook - Presenting to the Board

Written by a former CISO, this white paper describes strategies for effectively articulating your risk posture and security strategy to business executives.

Download now

Addressing the Scalability Challenge with Cloud-Based Application Security

Every enterprise is now a digital business. This whitepaper provides a detailed overview of Veracode's cloud-based service for protecting against application-layer threats and addressing compliance requirements.

Download now

8 Patterns of Secure Agile Teams

Developing secure products in an agile environment can be challenging. Application vulnerabilities and coding issues are typically time-consuming to find, document, and fix with traditional testing tools. Short agile sprints don’t lend themselves to these long processes; however, there are ways to effectively integrate secure development with agile methods.

Download now

Hacking Exposed 7 - Chapter 10: Web and Database Hacking

The prerequisite for dealing with cyber-security is knowledge. Download this critical chapter to learn about web application vulnerabilities and hacking techniques; freely-available crawling tools; and countermeasures to protect your web application infrastructure.

Download the PDF

THREAT MODELING: Designing for Security

Adam Shostack is responsible for security development lifecycle (SDL) threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. With specific actionable advice, he details how to build better security into the design of software from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Software developers will appreciate the jargon-free and accessible introduction to this essential skill. Security professionals will learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.

Download the whitepaper

FS-ISAC Third Party Software Security Working Group Recommended Guidance

Download the whitepaper authored by the FS-ISAC Third Party Software Security Working Group to understand the recommended controls for addressing third party software risk.

This independent paper analyzes control options and offers specific recommendations on control types for financial services to add to their vendor governance programs

Download now

IDG Study: Why Application Security is a Business Imperative

The harsh reality is that most internally developed applications are not assessed for critical security vulnerabilities such as SQL injection. IDG Research Services recently surveyed top IT and security executives at enterprises across a variety of industries in the U.S. and the U.K. to better understand the enterprise security landscape. This paper examines the survey results.

Download the PDF

Secure Agile Development

This paper, written by the independent security analyst group Securosis, is for security professionals who want to understand Agile development and the issues developers face, so both teams can work together better. Security teams are sharply focused on bringing security to applications and meeting compliance requirements in the delivery of these applications and services. On the other hand, the #1 job for software developers is to deliver code faster and more efficiently, with security placing a distance second. Both security professionals and developers may be tasked with security, but finding the best way to embed security into the software development lifecycle (SDLC) is not an easy challenge.

Download now

Evolve To Become the 2018 CISO or Face Extinction

Read this report to learn about Forrester's 5-step plan for seizing control of your destiny as a CISO – and why the top 3 skills required to succeed are leadership, strategic thinking, and business knowledge.

Get the full report

Shining a Light on the False Security of 1000s of Mobile Apps

Enterprises are still experiencing the paradigm shift towards mobile computing and still struggling to implement both their mobility strategies and Bring-Your-Own-Device (BYOD) programs. While IT understands the enterprise benefits of this shift, there is a gap between mobility eagerness and its readiness to deal with the new types of application security risks inherent with all mobile platforms.  

Download now

Serious About Protecting Vendor Intellectual Property

Organizations of all types depend on Veracode to confidentially analyze third-party applications. Veracode is serious about protecting the vendor’s intellectual property embedded in an application’s binary.

Download now

SANS Mobile Application Security Survey

Mobile devices, particularly those owned by employees and used to access work applications, represent the latest front for attackers. Employees are downloading applications vulnerable to or infected with malware that mix with company e-mail, productivity/workforce, and other business applications.

Because of this new threat, SANS conducted a survey to discover organizational awareness and the procedures around mobile risk.

Download now

Understanding The Risks of Mobile Applications

Modern mobile applications run on mobile devices that have the functionality of a desktop or laptop running a general purpose operating system. In this respect many of the risks are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.

Download now

Broken Logic: Avoiding the Test Site Fallacy

Dynamic Application Security Testing (DAST) has become an integral part of the SDLC in most organizations today. DAST tool vendors demonstrate their tools by allowing prospects to scan test sites so they can see how the scanner works and the reports generated.
This paper illustrates why we should not gauge the effectiveness of a particular scanner by only looking at the results from scanning these public test sites.

Download now

Five Best Practices of Vendor Application Security Management

Download the guide – "Five Best Practices of Vendor Application Security Management” and learn how independent verification and validation of third-party software, delivered through an on-demand service, can automate security acceptance testing and secure your enterprise.

Download now

Application Security 101

How do you manage the risk posed by your applications? Are you confused by the multitude of technology options available to test your applications? What is the difference between penetration testing and automated scanning? Why do you need to build an effective Application Security program?

This paper will answer all these questions and provide nascent security professionals guidance and recommendations they need to build an effective Application Security program for their enterprises.

Download now

CISO's Guide to Application Security

The past few years have seen a massive increase in both the number and severity of threats facing applications. With these new threats comes a serious increase in the amount of pressure being put on Chief Information Security Officers (CISO) and their IT security teams to protect this gateway to sensitive company and customer data. However, making a case for increased investment in application security can be a seemingly daunting task.

This paper will provide CISOs and their security teams with guidance for justifying application security investment as well as recommendations for how they can build their efforts into advanced application security programs.

Download now

Veracode Answers Gartner's Critical Security Questions

In September 2011 Gartner published a research note (ID Number: G00216359) titled “Critical Security Questions to Ask a Cloud Service Provider”. The research note provides a checklist of security-related questions that organizations should ask prospective providers of cloud-based services, as part of their due diligence process. For the full report, please contact Gartner directly.

Veracode fully agrees that security is a core component of any cloud-based platform or service. We embrace Gartner’s checklist as part of an organization’s process for evaluating cloud-based application security solutions. Veracode’s specific approach and response to each Gartner requirement is outlined within.

Download now

Eradicate Cross-site Scripting

The Web’s most prevalent application vulnerability remains an open door to attack on your business and your customers. It doesn’t have to be. Eradicate Cross-site Scripting is a whitepaper written to empower organizations to expand their web security programs. This whitepaper provides an introduction to Cross-site Scripting (XSS) and details of Veracode's Free Service that empowers you to begin a campaign to eradicate XSS vulnerabilities in corporate applications.

Download now

Policy-Driven Software Security From Ad-Hoc Testing to a Programmatic Approach

What do Google, RSA, Sony, PBS, Barracuda Networks, HBGary and numerous other high profile organizations have in common? All have been breached through vulnerabilities in software applications and often by applications that they didn’t develop, but rather purchased from third-parties. One thing is clear—Software is the Achilles’ heel of information security; vulnerable applications represent a critical area of exposure and a highly significant risk to the business. And yet, while organizations take a rigorous approach to quality assurance of their applications from a functional perspective, very few have anything close to a systematic, policy-based program for detecting and remediating software security flaws.

Download now

Successful Application Security Testing for Agile Development

It is an imperative to include security testing in application development. Yet, with Agile’s fast pace, and lean concepts, it easy to see how many organizations would simply consider testing for application security defects to be too costly in terms of both time and resources. The reasons behind these beliefs are concerns over the cost of the tooling versus the benefit, the cost of deployment and training of the tools, the inability for these tools to fit into Agile development processes, and the objections of developers who must become proficient in the use of the tools. This paper addresses these concerns and describes methods that utilize Veracode’s Security Review and methodologies for security testing that succeed in the Agile world.

Download now

PCI Guide for Payment Vendors

This whitepaper explains how Payment Vendors can meet Visa PABP requirements and prepare for PCI PA-DSS compliance.

Download now

Guide to Software Risk Assessments

This whitepaper outlines how new application security technologies enable organizations to meet the growing threat posed by software and provides risk management best practices which enterprises can use to secure their application inventory.

Download now

PCI Guide for Merchants and Service Providers

This whitepaper helps Merchants and Service Providers understand and meet PCI DSS requirements.

Download now