The prerequisite for dealing with cyber-security is knowledge. Download this critical chapter to learn about web application vulnerabilities and hacking techniques; freely-available crawling tools; and countermeasures to protect your web application infrastructure.
Organizations of all types depend on Veracode to confidentially analyze third-party applications. Veracode is serious about protecting the vendor’s intellectual property embedded in an application’s binary.
Enterprises are still experiencing the paradigm shift towards mobile computing and still struggling to implement both their mobility strategies and Bring-Your-Own-Device (BYOD) programs. While IT understands the enterprise benefits of this shift, there is a gap between mobility eagerness and its readiness to deal with the new types of application security risks inherent with all mobile platforms.
As part of its FISMA responsibility to develop standards and guidance for federal agencies, NIST created Special Publication (SP) 800-37 “Guide for the Security Certification and Accreditation of Federal Information Systems.” This whitepaper helps readers understand the relationship between NIST 800-37, FISMA and application security testing.
This whitepaper explains how Payment Vendors can meet Visa PABP requirements and prepare for PCI PA-DSS compliance.
On-demand application security testing offered as an outsourced service – based on binary analysis and multiple scanning technologies – is a major step toward reducing risk in applications developed in house as well as applications purchased from third party vendors. Learn how moving to a SaaS model for application security can automate your code reviews.
This whitepaper helps Merchants and Service Providers understand and meet PCI DSS requirements.
This whitepaper outlines how new application security technologies enable organizations to meet the growing threat posed by software and provides risk management best practices which enterprises can use to secure their application inventory.
The Web’s most prevalent application vulnerability remains an open door to attack on your business and your customers. It doesn’t have to be. Eradicate Cross-site Scripting is a whitepaper written to empower organizations to expand their web security programs. This whitepaper provides an introduction to Cross-site Scripting (XSS) and details of Veracode's Free Service that empowers you to begin a campaign to eradicate XSS vulnerabilities in corporate applications.
It is an imperative to include security testing in application development. Yet, with Agile’s fast pace, and lean concepts, it easy to see how many organizations would simply consider testing for application security defects to be too costly in terms of both time and resources. The reasons behind these beliefs are concerns over the cost of the tooling versus the benefit, the cost of deployment and training of the tools, the inability for these tools to fit into Agile development processes, and the objections of developers who must become proficient in the use of the tools. This paper addresses these concerns and describes methods that utilize Veracode’s Security Review and methodologies for security testing that succeed in the Agile world.
This document addresses many questions often asked upon results being made available to a vendor in an enterprise-vendor relationship.
As companies are trying to adapt to the fast changing threat landscape today, web applications are becoming increasingly vulnerable to attacks because of vulnerabilities like Cross-site Scripting (XSS).
Find out how attackers exploit SQL flaws and how to fix and prevent SQL Injection vulnerabilities.
The Veracode Application Perimeter Monitoring (APM) solution enables enterprises to reduce the risk of data breaches by providing a rapid and massively scalable approach for gathering vulnerability intelligence across every enterprise web application.
Learn how we help the world's largest enterprises reduce global application risk across web, mobile and third-party applications.
Whether you are developing code in a two-week Scrum Sprint, using continuous integration or a more traditional development model, your security tools should support the model and developer tools that make your team most productive.
Veracode VerAfied enables organizations to quickly provide details about the security of their applications.
Veracode’s program management services are designed to ensure successful adoption of an application security program for each of our customers. This datasheet shows how a Veracode customer was able to leverage Veracode's expertise to design and implement a successful application security program within their organization.