ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Veracode, Inc.

  • State of Software Security

    Download this 57-page e-book which covers the entire state of software security with data covering identifying new trends, the biggest security questions to address, and 3 key takeaways.

  • Security & Risk Management Summit: How to Approach Container Security

    Read this blog from the Gartner Security & Risk Management Summit for Gartner's top 3 recommendations on container security and how Veracode can help you meet their #1.

  • Open Source Represents Opportunity and Risk

    Open source is here to stay, but so too are the security risks involved in using open source software. Open this resource to learn more about the underlying risks and how you can mitigate them.

  • Building a Business Case for Expanding Your Appsec Program

    Code vulnerabilities and cyber threats are affecting absolutely everyone, and there is no longer any reason for security to be an afterthought in the application development process. Jump into this guide to learn how to build your case for a shift left in application security.

  • Application Security Beyond Scanning

    To make app security truly effective, there are 3 critical steps you must take beyond scanning to develop more secure code. Download this white paper to learn those 3 steps and how you can get started implementing them today.

  • Exploring Coordinated Disclosure

    Veracode commissioned 451 Research to gain a deeper understanding of the motivations of security researchers, actions when a vulnerability is identified, timing for disclosure, desired outcomes, how organizations structure disclosure policies, and the effectiveness of bug bounties. Read on to learn more.

  • Dynamic Analysis in a DevSecOps World

    Prioritizing security during development can become a hassle when trying to ensure an application delivers on operational functionality. Download this DevSecOps guide on dynamic testing and analysis benefits, and see how it can boost encapsulation from 22% to 39%.

  • Making Application Security Pay

    Jump into this whitepaper to learn strategies for improving the effectiveness of your application security process, from developer training, to remediation coaching, automated testing, and more.

  • Secure Coding Best Practices Handbook

    Access this whitepaper to learn some of the best steps you can take today to have more secure coding practices, and the many risks you'll be able to address.

  • The Total Economic Impact Of Veracode Application Security Platform

    Check out this ROI analysis of Veracode's application security platform to find out just how much more secure your apps could be, and how you can reduce security flaw resolution time by 90%.

  • Application Security Beyond Scanning

    To make application security truly effective at reducing the risk of a damaging breach, there are three critical steps beyond scanning to help develop more secure code. Explore those three critical steps in this whitepaper.

  • Secure DevOps: Fact or Fiction?

    It's important to build security into your DevOps process. This is easier said than done, but take a look through this DevOps security guide to uncover how to shift security left, who should be responsible for security, and how to quickly improve the quality of the applications you are developing.

  • Blue Prism Transforms Security from Reactive to Proactive with Veracode

    Establishing trust in your product's security is just as important as its overall quality in the eye of the user -- a fact almost all developers are familiar with. That's why many development teams are making a shift from reactive to proactive application security models. Keep reading to find out why, illustrated by a real world story.

  • AppSec: What not to do

    Read on to learn the most common AppSec mistakes and the best practices that will lead your organization to success by avoiding those mistakes.

  • State of Software Security

    Veracode analyzed more than 700,000 application scans, representing more than 2 trillion lines of code. Access this paper for a snapshot of what the data shows about the state of software security today.

  • Making Application Security Pay

    Read this paper to learn how to maximize ROI on AppSec by measuring, proving, and amplifying the effects of AppSec.

  • Understanding Your Open Source Risk

    Read this paper to learn how with the increasing use of open source libraries comes an increase in vulnerabilities and learn how Veracode can help prevent these vulnerabilities.

  • Cross Site Scripting

    This paper explains how cross-site scripting (XSS) vulnerabilities give attackers the capability to inject client-side scripts into the application. Read on to learn how to prevent these vulnerabilities.

  • Broken Access Controls

    Read this paper to find out how weak security controls could allow unauthorized users to access things you don't want them accessing and learn how to prevent these issues with secure coding practices.

  • 5 Principles for Securing DevOps

    Read this paper to learn how DevOps is transforming the way the world creates software and how following five principles will get your organization on the right path to securing code at DevOps speed.

  • Insecure Open Source Components

    Access this paper to learn about the risks of insecure open source components and how to prevent those vulnerabilities with application security tools that integrate with your IDE.

  • Components: Increasing Speed and Risk

    Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.

  • Everything You Need to Know About Getting Application Security Buy-in

    Application security impacts multiple groups across the entire organization. Read this paper to learn everything you need to know about getting these groups to buy-in on application security.

  • State of Software Security 2017

    If you're looking to take another step up in your security posture or taking your first step in the right direction read this report to learn how to improve your own application security program.

  • Five Principles for Securing DevOps

    Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.