Resources

Browse through the materials below to learn what the industry is saying about best practices for application security.

Global Bank Scales AppSec

Global Bank Scales Application Security Program to 1,000+ Applications

Global 100 Manufacturers

Global Manufacturer Reduces Risk Across 30,000 Domains in Eight Days

A Pragmatic Approach to Benchmarking AppSec

A Pragmatic Approach to Benchmarking Application Security

SANS Webinar Are There Gaps in Your Heartbleed Response Plan

SANS Webinar: Are There Gaps in Your Heartbleed Response Plan?

Are you Only Testing Web Apps in Production

Are You Only Testing Web Apps in Production?

Hacking Exposed: Web and Database Hacking

Hacking Exposed 7 - Chapter 10: Web and Database Hacking

Secure Agile Through Automated Toolchains

Secure Agile Through An Automated Toolchain: How Veracode R&D Does It

How Third-Party Security Impacts Your Enterprise Risk

PCI 3.0: How Third-Party Security Impacts Your Enterprise Risk

Thomson Reuters Hot to Implement an AppSec

Thomson Reuters: How to Implement an Application Security Program for Third-Party Software

Serious About Protecting Vendor Intellectual Property

Serious About Protecting Vendor Intellectual Property

Building Security into the Agile SDLC

Building Security into the Agile SDLC: View from the Trenches

A Better Approach to Third-Party Software

A Better Approach to Third Party Software Security - Episode 3 Featuring: Chris Wysopal, CTO, Veracode

A Better Approach to Third-Party Software

A Better Approach to Third Party Software Security - Episode 2 Featuring: Wendy Nather, Research Director

A Better Approach to Third-Party Software

A Better Approach to Third Party Software Security - Episode 1 Featuring: Jim Routh, CISO

Web Application Perimeter Monitoring

Protecting Your Organization From Application Backdoors

Protecting Your Organization from Application Backdoors

Outsourcing the Problem of Software Security

Quocirca - Outsourcing the Problem of Software Security

Opportunity small

451 Research: Veracode Eyes a VAST Opportunity in Third-Party Application Security Testing

Confronting Cyber Risk in Critical Infrastructure

Good Harbor Consulting - Confronting Cyber Risk in Critical Infrastructure

VerAfied by Veracode

sossV1

Veracode State of Software Security Volume 1 Executive Summary

sossV1

State of Software Security Report Volume 1

sossV2

Veracode State of Software Security Volume 2 Executive Summary

sossV2

State of Software Security Report Volume 2

sossV3

Veracode State of Software Security Volume 3 Executive Summary

sossV3

State of Software Security Report Volume 3

sossV4

Veracode State of Software Security Volume 4 Executive Summary

sossV4

State of Software Security Report Volume 4

public companies

Veracode State of Software Security Report – Feature Supplement on Public Companies

sossV5

State of Software Security Report Volume 5

Manage Enterprise Risk with Testing of the Software Supply Chain

State of Software Security Report - Feature Supplement on Software Supply Chain

Defending the Front Lines Securing Your Web App

Defending The Front Lines: Securing Your Web Applications

Stop Insecure Software at the Front Door

Stop Insecure Software at the Front Door

Forrester Survey Briefing Webinar Software Risk in Enterprises

Forrester Survey Briefing Webcast - Software Risk in Enterprises

Best Practices in Secure Coding for the SDLC

Best Practices in Secure Coding for the SDLC

The End of Application Development as you Know it

The End of Application Development As You Know It

Avoiding the SANS Top 25 Most Dangerous Programming Errors

Avoiding the SANS Top 25 Most Dangerous Programming Errors

Agile Overview

Agile Overview

State of Software Security

State of Software Security Volume 2

Building Blocks for PCI DSS

Building Blocks for PCI DSS 2.0

No More Excuses Eradicate Cross-Site Scripting Now

No More Excuses: Eradicate Cross-site Scripting Now.

State of Software Security

State of Software Security Volume 3 Webinar

Dirty Little Secrets Mobile Apps Invading Your Privacy

Dirty Little Secrets: Mobile Apps Invading Your Privacy

Owning Your Phone at Every Layer

Owning Your Phone at Every Layer

Application Security Fundamentals

The Top 5 Most Prevalent Web Application Vulnerabilities

Top 5 Most Prevalent Web Application Vulnerabilities

Penny Wise, Pound Foolish Avoiding Security Spend Pitfalls

Penny Wise, Pound Foolish-Avoiding Security Spend Pitfalls

State of Software Security

State of Software Security Volume 4 Part 1

State of Software Security

State of Software Security Volume 4 Part 2

How to Build an AppSec Training Program for Development Teams

How to Build an Application Security Training Program for Development Teams

Pages

 

 

contact menu