ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Veracode, Inc.

  • Disclosures 2012 - The Vulnerability of Publicly Traded Companies

    In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.

  • Top 10 Mobile Application Risks

    In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.

  • Understanding the risks of mobile apps

    Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.

  • Expert guide to understanding SaaS and cloud computing issues

    This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.

  • How to prevent cross-site scripting attacks: Expert tactics

    This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.

  • State of Software Security Report Volume 4

    Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.

  • Musings on the PSN Attack Vector

    Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.

  • Dirty Little Secrets: Mobile Apps Invading Your Privacy

    Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.

  • State of Software Security Report

    The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications.

  • Eradicate Cross-Site Scripting

    The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation.

  • Barclays Application Security Assurance Project

    As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.

  • Magic Quadrant for Static Application Security Testing

    In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.

  • The Mobile App Top 10 Risks

    This expert webcast reveals the top 10 mobile application risks facing organizations today.

  • Basic Building Blocks: Preparing for PCI DSS 2.0

    With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.

  • IT Risk Management: Guide to Software Risk Assessments and Audits

    Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices.

  • Automating Your Code Review: Moving to a SaaS Model for Application Security

    Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.

  • Five Steps to Secure Outsourced Application Development

    Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development.

  • Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications

    Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities.

  • Veracode eLearning Subscription

    Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more.

  • Avoiding the SANS Top 25 Most Dangerous Programming Errors

    The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.

  • Five Steps to Secure Outsourced Application Development

    Application security has risen to the top of the agenda for security professionals striving to control their overall risk profile. According to US Computer Emergency Response Team (US-CERT) and Gartner, 75% of new attacks target the application layer and software vulnerabilities have reached...

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.