ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Veracode, Inc.

  • From Agile Development to DevOps to DevSecOps

    A DevSecOps process is the best way to ensure you're developing high quality applications with security in mind. Learn how to approach DevSecOps in this quick video.

  • AppSec: What not to do

    Read on to learn the most common AppSec mistakes and the best practices that will lead your organization to success by avoiding those mistakes.

  • Making Application Security Pay

    Read this paper to learn how to maximize ROI on AppSec by measuring, proving, and amplifying the effects of AppSec.

  • Understanding Your Open Source Risk

    Read this paper to learn how with the increasing use of open source libraries comes an increase in vulnerabilities and learn how Veracode can help prevent these vulnerabilities.

  • State of Software Security

    Veracode analyzed more than 700,000 application scans, representing more than 2 trillion lines of code. Access this paper for a snapshot of what the data shows about the state of software security today.

  • Cross Site Scripting

    This paper explains how cross-site scripting (XSS) vulnerabilities give attackers the capability to inject client-side scripts into the application. Read on to learn how to prevent these vulnerabilities.

  • Broken Access Controls

    Read this paper to find out how weak security controls could allow unauthorized users to access things you don't want them accessing and learn how to prevent these issues with secure coding practices.

  • Insecure Open Source Components

    Access this paper to learn about the risks of insecure open source components and how to prevent those vulnerabilities with application security tools that integrate with your IDE.

  • 5 Principles for Securing DevOps

    Read this paper to learn how DevOps is transforming the way the world creates software and how following five principles will get your organization on the right path to securing code at DevOps speed.

  • The State of Software Security: Volume 9

    In this report, get a clear picture of software security risk, uncover how long it takes for different types of vulnerabilities to be fixed, and to understand why certain risks linger for as long as they do.

  • Components: Increasing Speed and Risk

    Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.

  • Everything You Need to Know About Getting Application Security Buy-in

    Application security impacts multiple groups across the entire organization. Read this paper to learn everything you need to know about getting these groups to buy-in on application security.

  • Putting Security into DevOps

    Use this guide on security in DevOps to prove how useful a DevOps adoption can be for your application security, and gain executive buy-in for your organization's adoption efforts.

  • Five Principles for Securing DevOps

    Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.

  • Application Security as a Competitive Advantage

    Application security a critical priority today. Learn how to address application security concerns while also gaining a competitive advantage at the same time in this video.

  • Everything You Need to Know About Application Security Policies

    Lacking strong application security policies, your developers and security teams might be overwhelmed by alerts and notifications. Explore some key points to help build your app security program that gives you only the alerts you need.

  • A Tale of Two Teams

    As DevSecOps changes the way software is created and distributed, it is also changing the roles and responsibilities of the development and security teams. Explore these new processes and priorities for each team throughout the software lifecycle.

  • How to Get Your Software CA Veracode Verified

    When your application is CA Veracode Verified, you prove at a glance that you've made security a priority. In this e-book, gain valuable insight into the steps you need to take to reach the highest verified level and make security a priority.

  • Don't Invite Bad Code In

    Download this white paper to discover a software composition analysis technology that checks your third-party code at the same time you're scanning your own code, giving you complete visibility into your applications' security, in a single report.

  • Achieving a Competitive Advantage Through Application Security

    Download this resource to uncover five key takeaways from a research report showing how to make application security a competitive advantage for your organization.

  • How To Make Application Security A Competitive Advantage

    Download this white paper to learn about the critical importance of application security in the enterprise and how you can make app security a competitive advantage.

  • Components: Increasing Speed and Risk

    Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.

  • Everything You Need to Know About Getting Application Security Buy-in

    Application security impacts multiple groups across the entire organization. Read this paper to learn everything you need to know about getting these groups to buy-in on application security.

  • State of Software Security 2017

    If you're looking to take another step up in your security posture or taking your first step in the right direction read this report to learn how to improve your own application security program.

  • Five Principles for Securing DevOps

    Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.