Managing AppSec

When your application security program is up and running, you need best-practice advice on managing and growing the program. Our security experts will guide you through important steps like measuring the success of your program or expanding it to cover more of the application landscape.

How the Legal Department Can Improve Your Vendor Application Security Program

jlavery's picture
By Jessica Lavery March 16, 2016  | Managing AppSec

In order to keep up with the need for applications, companies are purchasing software at an accelerated rate. And if you are like most companies, your processes for vetting the security of your software is probably not very sophisticated. Most companies rely on questionnaires or even just a wink and a nod from the vendor’s account manager. Companies that recognize the risk introduced from... READ MORE

Why You Need Your Boss’ Buy-In for Application Security

sciccone's picture
By Suzanne Ciccone March 14, 2016  | Managing AppSec

Want your application security program to succeed? Get your boss on board. You need your CISO’s buy-in, and not just for scanning or pen testing a few business-critical apps – but for building a mature, robust program that secures every application the organization builds, buys or assembles. Here’s why: Reason 1: You need your boss to be a champion for your program with the C-... READ MORE

Google’s Vendor Security Assessment | Veracode

anielsen's picture
By Anne Nielsen March 10, 2016  | Managing AppSec

Software supply chain security has arrived with Google’s Vendor Security Assessment Questionnaire (VSAQ)! Or has it? The web-based application released under an open-source license on GitHub contains the actual questionnaire Google uses to review its own software vendors' security practices before making a purchase. I know what you’re thinking: “if it’s good... READ MORE

Why RASP does not negate the need for testing

jfeiman's picture
By Joseph Feiman February 22, 2016  | Managing AppSec

https://www.veracode.com/products/binary-static-analysis-sastWhen one calls a technology “transformational” as I have with RASP, there are expectations that this technology will change the direction of a market. The market expects the solution to address a serious problem in such a way that the problem is made much smaller. One misconception is that this transformational... READ MORE

Combatting the Top Four Sources of Vulnerabilities

jlavery's picture
By Jessica Lavery February 18, 2016  | Managing AppSec

In the past I’ve asked “Why Appsec?” and then answered my own question – “Because Application-Layer Breaches ARE Damaging Businesses”. We are seeing more breaches due to application layer attacks than ever before – according to research done by the Department of Homeland security, 90 percent of security incidents are the result of exploits against... READ MORE

Why you need an AppSec Quick Win

jlavery's picture
By Jessica Lavery February 18, 2016  | Managing AppSec

web-apps-perimeter.png Application security does not get the attention it deserves. So, when you finally get the green light to start an application security program, the first thing you should be thinking is “how do I make sure my boss and other stakeholders recognize our successes so I can expand the program”. And when a business invests in something as complex as... READ MORE

A Pragmatic Approach to Leveraging WAF and RASP

JPelletier's picture
By Joe Pelletier February 16, 2016  | Managing AppSec

Updated: 7/18/2017 Runtime Application Self-Protection (RASP) is a revolutionary technology that aims at improving application security.  RASP integrates monitoring and protection as part of the deployment of web applications making it the first technology to provide protection in real-time. RASP is a new technology with the promise of improving application security by enabling applications... READ MORE

Why Ignoring Development and Security Teams Undermines Application Security

sciccone's picture
By Suzanne Ciccone February 11, 2016  | Managing AppSec

47913936_ml.jpg In an era of increasingly sophisticated data hacks and attacks, there's a critical need to move beyond protecting your business’s perimeter. To thoroughly safeguard your organization, your enterprise must adopt an approach that addresses systems and software throughout their lifecycles. A key piece of this strategic approach? Application security. According... READ MORE

How to Train a Globally Distributed Development Team

alee's picture
By Amanda Lee February 10, 2016  | Managing AppSec | Secure Development

How companies with successful AppSec programs train globally distributed teams on secure development practices and security guidelines. Every large organization now has a complex and globally distributed software development process. It doesn’t matter whether your developers are in-house or out-sourced; based in Bangalore or Boston, the expectation is that quality, bug-free, secure software... READ MORE

Quick Wins: Get Defensive About App Security | Veracode

sciccone's picture
By Suzanne Ciccone February 8, 2016  | Managing AppSec

Application security differs from other forms of security in the number of people it affects. Unlike installing a firewall or anti-virus software, an application security program will affect the everyday routines of many employees in many departments throughout your organization. And you need those employees to buy-in to the goals and policies of your program for it to succeed. Want a good way to... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.

 

 

 

contact menu