Enterprises are still experiencing the paradigm shift towards mobile computing and still struggling to implement both their mobility strategies and Bring-Your-Own-Device (BYOD) programs. While IT understands the enterprise benefits of this shift, there is a gap between mobility eagerness and its readiness to deal with the new types of application security risks inherent with all mobile platforms.
As part of its FISMA responsibility to develop standards and guidance for federal agencies, NIST created Special Publication (SP) 800-37 “Guide for the Security Certification and Accreditation of Federal Information Systems.” This whitepaper helps readers understand the relationship between NIST 800-37, FISMA and application security testing.
This whitepaper explains how Payment Vendors can meet Visa PABP requirements and prepare for PCI PA-DSS compliance.
On-demand application security testing offered as an outsourced service – based on binary analysis and multiple scanning technologies – is a major step toward reducing risk in applications developed in house as well as applications purchased from third party vendors. Learn how moving to a SaaS model for application security can automate your code reviews.
This whitepaper helps Merchants and Service Providers understand and meet PCI DSS requirements.
This whitepaper outlines how new application security technologies enable organizations to meet the growing threat posed by software and provides risk management best practices which enterprises can use to secure their application inventory.
The Web’s most prevalent application vulnerability remains an open door to attack on your business and your customers. It doesn’t have to be. Eradicate Cross-site Scripting is a whitepaper written to empower organizations to expand their web security programs. This whitepaper provides an introduction to Cross-site Scripting (XSS) and details of Veracode's Free Service that empowers you to begin a campaign to eradicate XSS vulnerabilities in corporate applications.
It is an imperative to include security testing in application development. Yet, with Agile’s fast pace, and lean concepts, it easy to see how many organizations would simply consider testing for application security defects to be too costly in terms of both time and resources. The reasons behind these beliefs are concerns over the cost of the tooling versus the benefit, the cost of deployment and training of the tools, the inability for these tools to fit into Agile development processes, and the objections of developers who must become proficient in the use of the tools. This paper addresses these concerns and describes methods that utilize Veracode’s Security Review and methodologies for security testing that succeed in the Agile world.
Modern mobile applications run on mobile devices that have the functionality of a desktop or laptop running a general purpose operating system. In this respect many of the risks are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.
What do Google, RSA, Sony, PBS, Barracuda Networks, HBGary and numerous other high profile organizations have in common? All have been breached through vulnerabilities in software applications and often by applications that they didn’t develop, but rather purchased from third-parties. One thing is clear—Software is the Achilles’ heel of information security; vulnerable applications represent a critical area of exposure and a highly significant risk to the business. And yet, while organizations take a rigorous approach to quality assurance of their applications from a functional perspective, very few have anything close to a systematic, policy-based program for detecting and remediating software security flaws.
As companies are trying to adapt to the fast changing threat landscape today, web applications are becoming increasingly vulnerable to attacks because of vulnerabilities like Cross-site Scripting (XSS).
Find out how attackers exploit SQL flaws and how to fix and prevent SQL Injection vulnerabilities.
The Veracode Application Perimeter Monitoring (APM) solution enables enterprises to reduce the risk of data breaches by providing a rapid and massively scalable approach for gathering vulnerability intelligence across every enterprise web application.
Learn how we help the world's largest enterprises reduce global application risk across web, mobile and third-party applications.
Whether you are developing code in a two-week Scrum Sprint, using continuous integration or a more traditional development model, your security tools should support the model and developer tools that make your team most productive.
Veracode VerAfied enables organizations to quickly provide details about the security of their applications.
Veracode’s program management services are designed to ensure successful adoption of an application security program for each of our customers. This datasheet shows how a Veracode customer was able to leverage Veracode's expertise to design and implement a successful application security program within their organization.
Veracode's SOX Compliance Solution helps public companies protect the integrity of their financial data to comply with the Sarbanes-Oxley Act of 2002.
Veracode and Digital Defense have integrated their solutions to enable organizations to get a more comprehensive view of what their application risks are and where those risks reside on their networks. Organizations benefit from a comprehensive “infrastructure map” which layers application level flaws discovered by Veracode’s patented binary static analysis onto DDI’s network vulnerability analysis.