Intro to AppSec

For those new to application security, we cover the application security basics and answer questions such as what is application security, why it's important, how it fits in the security ecosystem and how to get started.

What is real-time security and why it is needed

jfeiman's picture
By Joseph Feiman January 29, 2016  | Intro to AppSec

28047375_ml.jpg Application security has emerged, evolved, matured and adopted at the programming and testing phases of application lifecycle, not at its operation phase. Technologies for application protection at the operation phase have been adopted at lesser degree and even then they are only adopted with some stipulation. This can be explained. Adopting application assessment/... READ MORE

How AppSec Fits into an Information Security Program

dbonderud's picture
By Doug Bonderud January 28, 2016  | Intro to AppSec

fits-well.jpg Want a better information security program? Most companies do and are willing to spend big money on safeguarding critical systems. As noted by Infosecurity Magazine, Allied Market Research predicts huge growth in the hardware encryption market, with a CAGR of more than 50 percent and a net value of almost $300 billion by 2020. But locking down data at rest and in... READ MORE

What Is Application Security?

jlavery's picture
By Jessica Lavery January 20, 2016  | Intro to AppSec

what-is-application-security-veracode-1.jpg The past few years have seen a tremendous increase in the number and severity of successful attacks aimed at the application layer. In fact, recent studies indicate that attacks on the application layer are growing by more than 25 percent annually (Akamai Q3 2015 State of the Internet - Security Report). The news headlines are filled with... READ MORE

Why Doesn’t Application Security Get Enough Attention?

jlavery's picture
By Jessica Lavery January 19, 2016  | Intro to AppSec

39760934_ml.jpg It is almost impossible to comprehend why application security isn’t getting more attention. In 2014 alone, there were eight major breaches through the application layer, resulting in more than 450 million personal or financial records stolen. And we aren’t talking about small breaches at companies no one has heard of. Target, JPMorgan Chase, Community... READ MORE

Interactions, Trust, and Google Chrome

gnorman's picture
By Glenn Norman January 14, 2016  | Intro to AppSec

“There are two ways you can do application security” sounds like the setup line for a joke, doesn't it? consequence-of-convenience.png Method 1 is what the majority says you're supposed to do, or at least what “best practices” tells you to do. Let's call that Method 1. Method 1 is the popular way to do network, system and application security... READ MORE

Why Appsec? Because Application-Layer Breaches ARE Damaging Businesses

jlavery's picture
By Jessica Lavery January 12, 2016  | Intro to AppSec

To say we at Veracode talk about the proliferation of applications and the dire need to secure these apps a lot would be a massive understatement. Securing the software that runs today's businesses, and frankly our lives, is our passion. 27827367_m.jpg We are so immersed in the concept of ensuring the world's software is secure, that we often forget this isn't the main... READ MORE

Application Security: What You Think You Know Is Wrong

echickowski's picture
By Ericka Chickowski December 21, 2015  | Intro to AppSec

apple-desk-laptop-working.jpg I've been covering the vagaries of AppSec for the better part of a decade now. And in spite of all the evidence that has surfaced over the years that points to the application layer as one of the riskiest in the IT infrastructure, I've observed that most IT programs haven't matured their AppSec programs accordingly. The level of investment... READ MORE

How AppSec Fits into the Security Ecosystem

jlavery's picture
By Jessica Lavery December 18, 2015  | Intro to AppSec

how-application-security-fits-security-ecosystem.JPG When securing your organization, there are a variety of strategies and technologies you can employ. You know that reducing risk means implementing a variety of security technologies that are interdependent and intertwined. This interdependency creates a security ecosystem, and like all ecosystems it must remain in balance in order... READ MORE

Don't Let AppSec Misconceptions Lead You Astray

ppaganini's picture
By Pierluigi Paganini December 17, 2015  | Intro to AppSec

When it comes to application security in a workplace, one of the main challenges is due to the misconception that it's hard to implement and very difficult to maintain. This fallacy mainly derives from a lack of awareness regarding cyberthreats and the correct way to mitigate them. AppSec represents a challenge for any organization because in the majority of cases, internal personnel aren... READ MORE

The Top 6 App Security Myths and Why You Can't Believe Them

jmontesi's picture
By John Montesi December 16, 2015  | Intro to AppSec

Application security is hardly the hottest topic around most water coolers. That hasn't stopped several app security myths from developing and spiraling out of control. Before one more person tells you that basic antivirus software can prevent all types of malicious hacking, drop everything you're doing and read this list of the top six AppSec myths. 1. It's too expensive. We've... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.




contact menu