Tim Jarrett

Tim Jarrett

Tim Jarrett is Senior Director of Product Marketing at Veracode. A Grammy-award winning product professional, he joined Veracode in 2008 and has a Bacon number of 3. He can be found on Twitter as @tojarrett.

Stay up to date on Application Security

Posts by Tim Jarrett
  • AppSec Bites Part 4: What Do Teams…
    | By Tim Jarrett

    The key to successfully implementing DevOps practices is relationships. It’s about breaking down the existing silos between different functions that deliver software, like development and operations. These functions need to work toward a common goal, efficient software delivery. The other…

    Read Article
     
  • AppSec Bites Part 1: Balancing Speed…
    | By Tim Jarrett

    A joint blog post from Veracode and ThreadFix In today’s world, speed wins. Just take Amazon for example. You can place an order with the click of a button and have it delivered to your door in under twenty-four hours. Retailers that can’t compete with Amazon’s speed are falling behind. The same…

    Read Article
     
  • Fixing CRLF Injection Logging Issues in…
    | By Tim Jarrett

    It can sometimes be a little challenging to figure out specifically how to address different vulnerability classes in Python. This article addresses one of the top finding categories found in Python, CWE 117 (also known as CRLF Injection), and shows how to use a custom log formatter to address the…

    Read Article
     
  • CI/CD With Veracode Docker Images
    | By Tim Jarrett

    On November 19, Veracode published new, official Docker images for use in continuous integration pipelines. The images, which provide access to Pipeline Scan, Policy (or Sandbox) scans, and the ability to access Veracode APIs via the Java API Wrapper or via HTTPie with the Veracode API Signing tool…

    Read Article
     
  • Application Security? But I Have a WAF!
    | By Tim Jarrett

    Updated 4/16/2020. Originally published 12/28/2016. It seems so tempting. Solve your application security problem by throwing an appliance at it. After all, if web applications are the most common form of attack, why not just protect them the same way you protect your network and email servers, and…

    Read Article
     
  • Best Practices for Complying with…
    | By Tim Jarrett

    In a previous blog post, we discussed how the proliferation of data breaches has caught the attention of regulators, which are increasingly focused on cybersecurity and application security. Case in point: Two recent major regulations – the EU General Data Protection Regulation (EU GDPR) and NY…

    Read Article