Nate Lord

Nate joined Veracode as a marketing specialist in early 2012. He is one of Veracode’s first co-ops from Northeastern University, where he is majoring in entrepreneurship and new venture management while minoring in music. He has various responsibilities at Veracode, including blogging, SEO, and infographic design.
Posts by Nate Lord

Facebook Privacy: CyberSecurity 101

April 23, 2013  | 4

While Facebook grants its users lots of control over their privacy settings, keeping up with the latest privacy controls can be difficult. As a result, many users end up sharing their information and photos with a far wider audience than intended. This edition of our CyberSecurity 101 series should serve as a user guide for configuring Facebook privacy settings for optimal security. Configuring... READ MORE

Browser Security Settings for Chrome, Firefox and Internet Explorer: Cybersecurity 101

March 22, 2013  | Security News 20

Optimizing your browser’s settings is a critical step in using the Internet securely and privately. Today’s popular browsers include built-in security features, but users often fail to optimize their browser’s security settings on installation. Failing to correctly set up your browser’s security features can put you at a higher risk for malware infections and malicious attacks. This installation... READ MORE

Can Bug Hunters Keep the Internet Safe? (Infographic)

January 29, 2013

Bug Bounty programs are more popular than ever these days. Leading companies such as Google, Mozilla, Facebook, and many others are offering bounties as high as $60,000 for hackers that can find critical vulnerabilities in their programs. Just yesterday Google increased the total reward pot to $3.14159 million for “Pwnium,” its Chrome hacking contest. It’s great to see so many organizations... READ MORE

Tips for Secure Web Browsing: Cybersecurity 101

January 22, 2013  | 6

Still looking for the right New Year’s Resolution? We’ve got one for you: develop secure web browsing habits. Given the range of threats facing Internet users today, it is critical that users learn to protect themselves while browsing the web. Our second post in our “Cybersecurity 101” series offers our recommendations for browsing the Internet safely. Best Practices for Secure Browsing There are... READ MORE

Mitigating Risks with Vendor-Supplied Software

October 24, 2012

We recently hosted a webinar featuring Chenxi Wang of Forrester Research Inc and Chad Holmes of Veracode that discussed how enterprises can better understand and reduce security risks associated with using vendor-supplied software. This blog post will highlight the key takeaways of the webinar. The webinar begins with Chenxi detailing the proliferation of third-party software use by enterprises... READ MORE

Third Party Application Analysis: Best Practices and Lessons Learned

September 18, 2012

This summer, Veracode Solutions Architect Chad Holmes presented a webinar on third party application analysis. The webinar recommended several best practices for enterprises, application vendors, and application analyzers to follow in the third party application analysis process. In this blog post we’ll highlight Chad’s best practices and the key takeaways from his presentation. Best Practices... READ MORE

Interview with Josh Corman at SOURCE Boston 2012 – Part 2

June 6, 2012

document.write(unescape("%3Ca href='mailto:?subject=" + document.title + "&body=" + document.URL + "' style='width: 22px;'%3E%3C/a%3E")); document.write(unescape("%3Ca href='" + document.URL + "' target='_blank' style='width: 22px;'%3E%3C/a%3E")); document.write(unescape("%3Ca href=" + document.URL + "... READ MORE

Interview with Josh Corman at SOURCE Boston 2012 - Part 1

June 4, 2012  | Customer News

This year’s SOURCE Boston gave us a chance to sit down and talk appsec with Josh Corman, Akamai Technologies’ Director of Security Intelligence. Our three part video interview primarily focused on enterprise level application security, with part one concentrating on important decisions facing organizations that are purchasing software and implementing application security programs. The video and... READ MORE

How Mobile Apps are Invading Your Privacy Infographic

May 31, 2012

Every week it seems like there is a new story about a popular mobile application having privacy issues that put its users at risk. With millions of mobile apps receiving billions of downloads, it is important that users are aware of the risks they face when downloading and using apps. This infographic uses real world cases to outline the threat to user privacy posed by mobile apps. Add this... READ MORE

A CISO's Guide to Application Security - Featured Series

May 24, 2012

Over the past several weeks, Veracode Director of Marketing Fergal Glynn has been authoring a series on application security for security news blog Threatpost. Titled “A CISO’s Guide to Application security,” the five-part series focuses on defining application security, outlining the elements of a comprehensive appsec program, educating about application and software related risks, determining... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.




contact menu