<!-- THEME DEBUG -->
<!-- THEME HOOK: 'views_view_field' -->
<!-- BEGIN OUTPUT from 'core/modules/views/templates/views-view-field.html.twig' -->
Anne Nielsen
<!-- END OUTPUT from 'core/modules/views/templates/views-view-field.html.twig' -->

Anne Nielsen

Senior Product Manager for Veracode’s application security platform including reporting, analytics and API feature sets as well are Veracode’s technology evolution from a monolithic architecture into MicroServices. Anne partners with Veracode customer’s to manage application security risk through new product features and functionality while enabling Veracode’s best in class scanning technologies.

Stay up to date on Application Security

Posts by Anne Nielsen
  • AppSec with LolCats: Click2Cat - the…
    April 1, 2021 | By  Anne Nielsen

    Fixing security findings in your code can be hard. Sometimes you need help from other developers who have solved these problems before. Veracode provides one-on-one time with ex-developers who can coach you through different approaches to address security findings. But sometimes, you don’t really…

    Read Article
  • Using Median Time to Resolve…
    April 13, 2020 | By  Anne Nielsen

    Customers that have embraced DevOps often ask me for the best metrics to measure their program. I always advocate focusing on policy compliance as the number one metric for understanding your risk, as this provides a succinct measurement of the security of your applications. However, if you are…

    Read Article
  • Should You Be Measuring Flaw Rate?
    August 27, 2019 | By  Anne Nielsen

    Metrics — or perhaps more accurately, the right metrics — are crucial for understanding what’s really happening in your AppSec program. They serve a dual purpose: They demonstrate your organization’s current state, and also show what progress it’s making in achieving its objectives.  We typically…

    Read Article
  • Detailing Veracode’s HMAC API…
    August 7, 2019 | By  Anne Nielsen

    Veracode’s RESTful APIs use Hash-based Message Authentication Code (HMAC) for authentication, which provides a significant security advantage over basic authentication methods that pass the username and password with every request. Passing credentials in the clear is not a recommended practice from…

    Read Article
  • Google’s Vendor Security Assessment |…
    March 10, 2016 | By  Anne Nielsen

    Software supply chain security has arrived with Google’s Vendor Security Assessment Questionnaire (VSAQ)! Or has it? The web-based application released under an open-source license on GitHub contains the actual questionnaire Google uses to review its own software vendors' security practices before…

    Read Article
  • WEBINAR: The Silent Assassins in Your…
    September 13, 2012 | By  Anne Nielsen

    On today’s webinar, “Web & Mobile Applications: The Silent Assassins in your Cyber Security Strategy”, we will discuss the evolution of the application security perimeter with Erik Peterson, Veracode’s Director of Product Strategy. Erik will highlight how mobile devices and web applications…

    Read Article

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.

Subscribe Now!

Product Videos