Resources

Browse through the materials below to learn what the industry is saying about best practices for application security.

How to Build an AppSec Training Program for Development Teams

How to Build an Application Security Training Program for Development Teams

Whats going Right With Your Secure Development Efforts

What's Going Right with your Secure Development Efforts?

Data Mining a Mountain of Zero Day Vulnerabilities

Data Mining a Mountain of Zero Day Vulnerabilities

The Vulnerability of Puiblicly Traded Companies

Disclosures 2012 - The Vulnerability of Publicly Traded Companies

Mid-Market Application Security Defend Like a Fortune 500

Mid-Market Application Security - Defend Like A Fortune 500 or Better

Thomson Reuters Hot to Implement an AppSec

Veracode and Thomson Reuters Discuss Web & Mobile Cyber Security Strategy

Broken Logic Avoiding the Test Site Fallacy

Broken Logic - Avoiding the Test Site Fallacy

Third-Party Application Analysis

Third-party Application Analysis - Best Practices and Lessons Learned

Mapping and Evolution of Android Permissions

Mapping and Evolution of Android Permissions

Web and Mobile Apps The Silent Assassins in your Cyber Security Strategy

Web & Mobile Apps - The Silent Assassins in your Cyber Security Strategy

Show me the Security Mitigating Risks with Vendor-Supplied Software

Show me the Security - Mitigating Risks with Vendor-Supplied Software

Crafting Super-Powered Rick Assessments

Crafting Super-Powered Risk Assessments

Power to The People Building Your Third-Party AppSec Program

Power to the People: Building Your Third-Party Application Security Program

Trust but VerAfy NSFOCUS on Why Software Providers Need Independet Security Attestation

Trust but VerAfy: NSFOCUS on Why Software Providers Need Independent Security Attestation

Don't Ask Don't Tell The Insecurity of Vendor-Supplied Software

Don't Ask, Don't Tell: The (In)Security of Vendor-Supplied Software

Budgeting for Defense

Budgeting for Defense

Mobile Security The Solution App Testing in a BYOD Federal

Mobile Security in a BYOD Federal World

We See the Future and its not Pretty

We See the Future... and It's Not Pretty

Understanding the Latest Security Threats in Software Applications

Understanding the Latest Security Threats

Mobile Security The Solution App Testing in a BYOD Federal

Next Phase of Mobile Security

Mobilizing the Masses: Building BYOD Security Awareness in your Workplace

Under Pressure When Clients Demand Proof of Security

Under Pressure: When Clients Demand Proof of Security

5 Steps for a Winning AppSec

5 Steps for a Winning Application Security Program

Work Smarter Not Harder

Work Smarter Not Harder: How You Can Get More From a Mature Security Program

What Are Employees Mobile Apps Doing Behind Your Back

What Are Employees Mobile Apps Doing Behind Your Back?

Anatomy of a Data Breach

Anatomy of a Data Breach: Types, Impact and Prevention

7 Days to SecureWeb Perimeter

7 Days to a Secure Web Perimeter

Something the Feds Got Right Software Supply Chain Security

Something the Feds Got Right: Software Supply Chain Security

Pages

 

 

contact menu