Jessica Lavery

Jessica is part of the content team at Veracode. In this role she strives to create and promote content that will engage, educate and inspire security professionals around the topic of application security. Jessica’s involvement with the security industry goes back more than a decade at companies like Astaro, and Sophos where she held roles in corporate communication and marketing.
Posts by Jessica Lavery

Why Application Security Programs Fail

December 17, 2015  | Managing AppSec

top-3-reasons-appsec-programs-fail-veracode.jpg The main hurdle that prohibits organizations from embarking on an advanced application security program is knowing where to start. But once you’ve figured out your starting point and your key metrics, and worked with groups in your enterprise to create a strategy, your program still isn’t guaranteed to be a success. There... READ MORE

How We Took Our Application Security Program From 0 to 60 in 12 Months

December 14, 2015  | Managing AppSec 3

In the grand scheme of an enterprise’s life, one year isn’t a long time. Especially when you are talking about designing, implementing, iterating and improving an application security program. But that is the amount of time one financial services company took to create and improve their application security program. Upon speaking with the project manager I was most struck by his... READ MORE

Presenting the Ultimate Guide to Getting Started with Application Security

December 10, 2015  | Intro to AppSec

Creating an Application Security Program Doesn’t Have to Be Like Climbing Everest Creating an application security program can be a daunting task – especially when you are starting from scratch! When you are beginning with nothing, the idea of creating a comprehensive and advanced application security program must feel like standing at the bottom of Mount Everest with your North Face... READ MORE

The case for anonymous case studies

December 10, 2015  | Managing AppSec

When beginning your application security journey, one of the most valuable actions you can take is to learn from the experiences of those who have gone before you. Yet the sensitive nature of security and the fear of becoming a target of hackers have led most enterprises to resist sharing their stories publicly. Some have shared their tales in closed-door meetings and exclusive events like the... READ MORE

Open Letter to Joe Biden - Consider security as your next career move

October 22, 2015  | Security News

Dear Vice President Biden, Joe, may I call you Joe? For months, political pundits, voters and the Democratic Party have been asking “will he or won’t he” with regard to your potential presidential intentions. On Wednesday, when you stood in the White House Rose Garden and announced that you will not run for president in 2016, you marked the end of what CNN described as your... READ MORE

Dark Reading News Desk: Security All Comes Back to Code

September 14, 2015

dr-bh-interview.JPG One of the great aspects of conferences like Black Hat in Las Vegas is the unscripted and candid conversations that take place. Journalists meet with industry experts to talk security trends, vendors talk to potential customers about their challenges and learn more about meeting market demands and, of course, attendees have impromptu discussions about the... READ MORE

UK Economy Under Siege: Business and Economic Consequences of Inadequate Cybersecurity

September 8, 2015

"WHSmith data breach spams confidential customer details," "Bank of England probes insurers' cyber defences," "Thomson data breach exposes hundreds of customer details" and "780 HIV patients' personal information disclosed in massive data breach." All headlines in the last 12 months from British publications talking about breaches in the UK. I'... READ MORE

Beyond the Quadrant: What the 2015 'Gartner Magic Quadrant for AST' Says About the AppSec Market

August 24, 2015  | Managing AppSec

On August 6, Gartner published the 2015 edition of the "Magic Quadrant for Application Security Testing¹" – and once again, Veracode is positioned in the "Leaders" quadrant. Our position in the quadrant, as well as the subsequent write-up of the company's strengths and cautions, is exciting, as we feel it validates that we are the best pure-play provider of... READ MORE

Are CISOs Spending Too Much Time Focusing on Technology?

August 21, 2015  | Managing AppSec

Following the onslaught of high-profile cyberattacks reported in the past 12 to 18 months, cybersecurity has become a more frequent topic in board-level conversations. This has created a need for CISOs to better understand board member perceptions and become more effective at communicating their cybersecurity strategies. However, a new study from Deloitte's CISO Transition Lab found CISOs... READ MORE

Beyond Breach Avoidance – Demonstrating the Value of Security

July 28, 2015  | Managing AppSec

Making a case for more security can be a difficult task at any enterprise. Many executives incorrectly assume that the lack of a recent breach means the company is adequately secure. However, as the old adage goes, there are only two kinds of companies: those that have been breached, and those that don't know they've been breached. Additionally, in the not-so-distant past, the CISO's... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.




contact menu