ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Veracode, Inc.

  • Financial Services Organizations

    Nowadays, compliance plays a key role on software security – which makes it a topic of interest for heavily-regulated industries like financial services. Read this e-guide to learn more about the impact of compliance regulations of software security and discover the potential harm of threats like security debt and data leakage.

  • Evaluating and Selecting AppSec Vendors to Fit Your Business Needs

    The application security (AppSec) market is oversaturated with an abundance of options, which can make finding an AppSec vendor/offering best fit for your unique needs a difficult task. Read this infosheet for some expert guidance to help get you started on your AppSec journey.

  • Communicating Application Security Success to Your Executive Leadership

    For CISOs, illustrating the gravity of security metrics to non-technical folks can sometimes be tricky. This infographic provides a broad set of data points you should illustrate when trying to demonstrate the success of your application security program – read on to get started.

  • SAST vs. DAST: What Are the Differencesand Why Are They Both Important?

    If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.

  • Understanding Your Open Source Risk

    Developers are being asked to push out more software — and in shorter periods of time — than ever before. This has led to an increased reliance on open source libraries, and as this code is reused, it comes with a high risk of vulnerability. Access this e-book to learn more about the risks of open source and the challenges in securing it.

  • Your Path to a Mature AppSec Program

    Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.

  • Addressing Your Open Source Risk

    Open source risks are often unique to each organization – requiring them to understand and evaluate their current posture before they attempt to address the risks. Read this e-guide to learn the 3 evaluation questions you should ask yourself and discover how Veracode may be able to help your organization overcome its unique open source risks.

  • Understanding Modern Software Development

    Download this resource to learn about how software development tools and processes changed recently, challenges developers run into while trying to balance these new tools and processes, and what security professionals can do to get developers fully on board with security.

  • Securing DevOps

    Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.

  • 4 Ways to Increase Developer Buy-In of AppSec

    Security developers have been doing their best to implement proper security measures, but since their performance is often tied to the rate of deployments, speed tends to take precedence.Access this article to learn about 4 steps you can take as a security professional to ensure that security doesn't take a backseat to speed.

  • Tips to Follow onYour AppSec Journey

    Best practices don’t become best practices overnight. There are first steps to take for each, not least in application security. So for processes such as testing, shifting left and vulnerability management, how can you start? Access this infographic to learn 5 AppSec best practices and 5 practical first steps to each.

  • The Advantages of a SaaS-Based Application Security Solution

    In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.

  • How Do Vulnerabilities Get Into Software?

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • AppSec: What not to do

    Read on to learn the most common AppSec mistakes and the best practices that will lead your organization to success by avoiding those mistakes.

  • State of Software Security

    Veracode analyzed more than 700,000 application scans, representing more than 2 trillion lines of code. Access this paper for a snapshot of what the data shows about the state of software security today.

  • Making Application Security Pay

    Read this paper to learn how to maximize ROI on AppSec by measuring, proving, and amplifying the effects of AppSec.

  • Understanding Your Open Source Risk

    Read this paper to learn how with the increasing use of open source libraries comes an increase in vulnerabilities and learn how Veracode can help prevent these vulnerabilities.

  • Cross Site Scripting

    This paper explains how cross-site scripting (XSS) vulnerabilities give attackers the capability to inject client-side scripts into the application. Read on to learn how to prevent these vulnerabilities.

  • Broken Access Controls

    Read this paper to find out how weak security controls could allow unauthorized users to access things you don't want them accessing and learn how to prevent these issues with secure coding practices.

  • 5 Principles for Securing DevOps

    Read this paper to learn how DevOps is transforming the way the world creates software and how following five principles will get your organization on the right path to securing code at DevOps speed.

  • Insecure Open Source Components

    Access this paper to learn about the risks of insecure open source components and how to prevent those vulnerabilities with application security tools that integrate with your IDE.

  • Components: Increasing Speed and Risk

    Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.

  • Everything You Need to Know About Getting Application Security Buy-in

    Application security impacts multiple groups across the entire organization. Read this paper to learn everything you need to know about getting these groups to buy-in on application security.

  • State of Software Security 2017

    If you're looking to take another step up in your security posture or taking your first step in the right direction read this report to learn how to improve your own application security program.

  • Five Principles for Securing DevOps

    Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences