Jessica Lavery

Jessica is part of the content team at Veracode. In this role she strives to create and promote content that will engage, educate and inspire security professionals around the topic of application security. Jessica’s involvement with the security industry goes back more than a decade at companies like Astaro, and Sophos where she held roles in corporate communication and marketing.
Posts by Jessica Lavery

Combatting the Top Four Sources of Vulnerabilities

February 18, 2016  | Managing AppSec

In the past I’ve asked “Why Appsec?” and then answered my own question – “Because Application-Layer Breaches ARE Damaging Businesses”. We are seeing more breaches due to application layer attacks than ever before – according to research done by the Department of Homeland security, 90 percent of security incidents are the result of exploits against... READ MORE

Why you need an AppSec Quick Win

February 18, 2016  | Managing AppSec

web-apps-perimeter.png Application security does not get the attention it deserves. So, when you finally get the green light to start an application security program, the first thing you should be thinking is “how do I make sure my boss and other stakeholders recognize our successes so I can expand the program”. And when a business invests in something as complex as... READ MORE

glibc – This Will Not Be the Last Open Source Component Vulnerability We See

February 17, 2016  | Security News

46610717_ml.jpg On Tuesday, February 16th, Google researchers issued a vulnerability disclosure for glibc (CVE-2015-7547). Though the media has dubbed this an “extremely severe bug,” it seems the majority of news articles and responses to this disclosure have been both measured and appropriate. This is surprising since the media typically hypes branded vulnerabilities,... READ MORE

Where do vulnerabilities come from?

February 11, 2016  | Intro to AppSec

I’ll tell you one thing, it isn’t the stork! It’s not the explicit fault of the developers either. Vulnerabilities come from a combination of insecure coding practices, an ever-shifting threat landscape, the use of vulnerable components and code and idiosyncrasies of programming languages. And despite the growing reliance on and risks related to software, these problems persist... READ MORE

What Is Application Security?

January 20, 2016  | Intro to AppSec

what-is-application-security-veracode-1.jpg The past few years have seen a tremendous increase in the number and severity of successful attacks aimed at the application layer. In fact, recent studies indicate that attacks on the application layer are growing by more than 25 percent annually (Akamai Q3 2015 State of the Internet - Security Report). The news headlines are filled with... READ MORE

Why Doesn’t Application Security Get Enough Attention?

January 19, 2016  | Intro to AppSec

39760934_ml.jpg It is almost impossible to comprehend why application security isn’t getting more attention. In 2014 alone, there were eight major breaches through the application layer, resulting in more than 450 million personal or financial records stolen. And we aren’t talking about small breaches at companies no one has heard of. Target, JPMorgan Chase, Community... READ MORE

Why Appsec? Because Application-Layer Breaches ARE Damaging Businesses

January 12, 2016  | Intro to AppSec

To say we at Veracode talk about the proliferation of applications and the dire need to secure these apps a lot would be a massive understatement. Securing the software that runs today's businesses, and frankly our lives, is our passion. 27827367_m.jpg We are so immersed in the concept of ensuring the world's software is secure, that we often forget this isn't the main topic of... READ MORE

Cracking the Code on Application Security Buy-in

January 7, 2016  | Managing AppSec

Application security is unlike other forms of IT security in several ways. One of the reasons it is so unique, and at times difficult, is because it is a project that never ends. With other forms of security, you implement a great solution, create your rules, and then monitor and tweak when necessary. These types of security don’t typically require creating a new set of protocols or a... READ MORE

How AppSec Fits into the Security Ecosystem

December 18, 2015  | Intro to AppSec

how-application-security-fits-security-ecosystem.JPG When securing your organization, there are a variety of strategies and technologies you can employ. You know that reducing risk means implementing a variety of security technologies that are interdependent and intertwined. This interdependency creates a security ecosystem, and like all ecosystems it must remain in balance in order... READ MORE

Checklist for Creating an Application Security Program

December 17, 2015  | Managing AppSec

As we know, creating an application security program can be a daunting task. Yet many companies have been successful by creating a plan for implementing a program that is broken up into manageable chunks. But once you’ve decided that you must implement an advanced program at your company, how do you know where to start? This checklist provides a practical guide for creating your application... READ MORE



contact menu