ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Veracode, Inc.

  • Large Financial Services Firm Passes Its PCI Audit— and Implements an Ongoing Governance Program

    A large financial services firm sought help with a one-time project to pass its payment card information (PCI) audit. View this case study now to see how this financial firm decided on continuous analysis, and the advantages they saw as a result. Also learn about a software system that achieves this without acquiring more servers.

  • The Impact of Data Breaches: Why Application Security is a Business Imperative

    64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.

  • Webinar: Why Benchmark Application Security?

    Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.

  • Webinar: When is Application Security Done?

    Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.

  • The Total Economic Impact of Veracode's Cloud-Based Application Security Service

    A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.

  • Five Program Management Best Practices When Designing App Security

    Program management is essential during the early stages of designing an application security program. This whitepaper discusses how a company implemented program management while developing an application security program, and the results they saw.

  • Addressing the Scalability Challenge with Cloud-Based Application Security

    Ad-hoc application security programs have led to inconsistent policies across businesses, as shown in this startling statistic: 93% of companies suffered a data breach in 2013. This whitepaper considers a software system that focuses on scalability and simplicity.

  • Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days

    A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.

  • Case Study: How a Global Bank Addressed App Security and Lowered Costs

    A global leader of major banks mandated a new top-down approach to reduce application-layer risk throughout its global software infrastructure. View this case study to see how a security solution helped this bank assess their security needs and reduce the opportunity for exploitation.

  • Magic Quadrant for Application Security Testing

    Choosing the right software security testing tool can be an overwhelming process. In this Gartner report, make your decision a little easier with a comparison of the top app security testing vendors on the market, including IBM, HP, Veracode, Aspect, and more.

  • Disclosures 2012 - The Vulnerability of Publicly Traded Companies

    In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.

  • Top 10 Mobile Application Risks

    In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.

  • Understanding the risks of mobile apps

    Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.

  • Expert guide to understanding SaaS and cloud computing issues

    This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.

  • State of Software Security Report Volume 4

    Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.

  • Musings on the PSN Attack Vector

    Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.

  • Dirty Little Secrets: Mobile Apps Invading Your Privacy

    Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.

  • State of Software Security Report

    The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications.

  • Eradicate Cross-Site Scripting

    The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation.

  • Barclays Application Security Assurance Project

    As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.

  • Magic Quadrant for Static Application Security Testing

    In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.

  • The Mobile App Top 10 Risks

    This expert webcast reveals the top 10 mobile application risks facing organizations today.

  • Basic Building Blocks: Preparing for PCI DSS 2.0

    With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.

  • IT Risk Management: Guide to Software Risk Assessments and Audits

    Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices.

  • Automating Your Code Review: Moving to a SaaS Model for Application Security

    Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.