Overview: Veracode is the leader for on-demand application security testing solutions. Veracode provides organizations with the only automated and independent security assessment across your entire application portfolio without exposing a company's source code.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Veracode, Inc..
Research offered by Veracode, Inc.
Automating Your Code Review: Moving to a SaaS Model for Application Security by Veracode, Inc.. February 10, 2009 - Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Avoiding the SANS Top 25 Most Dangerous Programming Errors by Veracode, Inc.. February 01, 2010 - The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Barclays Application Security Assurance Project by Veracode, Inc.. February 17, 2011 - As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.
Basic Building Blocks: Preparing for PCI DSS 2.0 by Veracode, Inc.. October 04, 2010 - With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Dirty Little Secrets: Mobile Apps Invading Your Privacy by Veracode, Inc.. July 27, 2011 - Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.
Disclosures 2012 - The Vulnerability of Publicly Traded Companies by Veracode, Inc.. May 23, 2012 - In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Eradicate Cross-Site Scripting by Veracode, Inc.. February 28, 2011 - The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation.
Expert guide to understanding SaaS and cloud computing issues by Veracode, Inc.. December 21, 2011 - This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.
Five Steps to Secure Outsourced Application Development by Veracode, Inc.. May 10, 2010 - Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development.
Five Steps to Secure Outsourced Application Development by Veracode, Inc.. February 10, 2009 - Application security has risen to the top of the agenda for security professionals striving to control their overall risk profile. According to US Computer Emergency Response Team (US-CERT) and Gartner, 75% of new attacks target the application layer and software vulnerabilities have reached...
How to prevent cross-site scripting attacks: Expert tactics by Veracode, Inc.. December 21, 2011 - This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.. June 07, 2010 - Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices.
Magic Quadrant for Static Application Security Testing by Veracode, Inc.. February 17, 2011 - In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.
Musings on the PSN Attack Vector by Veracode, Inc.. July 27, 2011 - Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by Veracode, Inc.. May 10, 2010 - Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities.
State of Software Security Report by Veracode, Inc.. February 28, 2011 - The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications.
State of Software Security Report Volume 4 by Veracode, Inc.. December 07, 2011 - Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
The Mobile App Top 10 Risks by Veracode, Inc.. February 15, 2011 - This expert webcast reveals the top 10 mobile application risks facing organizations today.
Top 10 Mobile Application Risks by Veracode, Inc.. May 11, 2012 -
In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.
Understanding the risks of mobile apps by Veracode, Inc.. May 11, 2012 - Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.
Veracode eLearning Subscription by Veracode, Inc.. May 07, 2010 - Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more.