The Biden administration released a new executive order for cybersecurity on May 12, 2021. Although many know the overarching message of the executive order, it’s also important to know the specific details outlined in each section. As our CEO Sam King…Read More How to Interpret the Various Sections of the Cybersecurity Executive Order
The role of the developer has evolved over the past several years. Developers are not only responsible for writing code and releasing new software rapidly but also for securing code. By implementing security in the software development lifecycle, you c…Read More Developer Training Checklist: 5 Best Practices
All security flaws should be fixed, right? In an ideal world, yes, all security flaws should be fixed as soon as they???re discovered. But for most organizations, fixing all security flaws isn???t feasible.
A practical step your organization can ??? an…
To achieve DevSecOps you need to shift security left. Sounds simple, right? Well, it???s easier said than done.
A recent survey conducted by SANS Institute found that 74 percent of organizations are deploying software changes more than once per month ?…
Over the past several years, an increasing amount of organizations have been moving their applications from on-premises to cloud-hosted platforms. And with the current pandemic forcing most businesses to adopt a fully remote work environment, the cloud…Read More DevSecOps and the Cloud: How Leaning on Your Cloud Provider Can Help You Shift Left
As a result of the worldwide pandemic, technology companies were forced to pivot to fully remote operations.ﾂ?For many organizations, this meant accelerating their digital transformation efforts.
But despite the investment in digital transformation eff…
The past 12 months have been especially challenging for the manufacturing industry. The pandemic affected in-person manufacturing jobs as well as supply and demand, causing many manufacturing companies to shut their doors or lay off valuable employees….Read More Manufacturing Has the Lowest Percentage of High-Severity Flaws but Needs to Improve Time to Remediation
When it comes to securing your applications, it???s not unusual to only consider the risks from your first-party code. But if you???re solely considering your own code, then your attack surface is likely bigger than you think.
Our recent State of Softw…
In light of the current pandemic, our healthcare industry has been challenged like never before. Healthcare workers heroically stepped up to the plate, caring for those in need, while the industry itself digitally transformed to keep up with the influx…Read More 75% of Apps in the Healthcare Industry Have a Security Vulnerability
The gold standard for creating an application security (AppSec) program is ??? and always will be ??? to follow best practices. By following preestablished and proven methods, you can ensure that you are maximizing the benefits of your AppSec program.
Over the past year, the retail and hospitality industries have been forced to adapt to the ???new normal.??? Since lockdowns and health concerns have prevented or dissuaded in-person shopping or dining, the new normal has been e-commerce. Smaller busin…Read More Retail and Hospitality Sector Has Impressive Fix Rate, but Room to Improve
Software is becoming an increasingly pivotal part of modern business and society. In turn, consumers have come to expect instant gratification. This has driven businesses to concentrate on innovation and speed to market. Businesses that can???t keep up…Read More Security as Code: Why It’s Important and What You Need to Know
TrustRadius recently awarded Veracode with a 2021 Best Application Security Feature Set Award and Best Application Security Customer Support Award. These honors are given to companies that have gone above and beyond to delight their users.
To win the B…
Over the past several years, there have been many changes to software development and software security, including new and enhanced application security (AppSec) scans and architectural shifts like serverless functions and microservices. But despite th…Read More How to Communicate Application Security Success to Your Executive Leadership
For this year???s State of Software Security v11 (SOSS) report, we examined how both the ???nature??? of applications and how we ???nurture??? them contribute to the time it takes to close out a security flaw. We found that the ???nature??? of applicat…Read More Nature vs. Nurture Tip 3: Employ SCA With SAST
Veracode CEO Sam King says that security can???t be successful, and in fact will become a blocker, if it operates in a silo. She recently sat down for a fireside chat with Mahi Dontamsetti, State Street CTRO, and Jim Routh, MassMutual CISO, to share he…Read More Veracode CEO on the Relationship Between Security and Business Functions: Security Can’t Be Effective in a Silo
For our annual State of Software Security report, we always look at the most common types of security flaws found in applications. It???s important to look at the various types of flaws present in applications so that application security (AppSec) team…Read More State of Software Security v11: The Most Common Security Flaws in Apps
It???s been a stressful year, to say the least, for the government and education sector. Government organizations were challenged with pivoting their operations to a digital model while schools were forced to decide between hybrid or remote learning pr…Read More Government and Education Have the Highest Percentage of Apps With Security Flaws
In our first blog in this series, Nature vs. Nurture Tip 1: Useﾂ?SAST With DAST, we discussed how this year???s State of Software Security (SOSS) report looked at how both ???nature??? and ???nurture??? contribute to the time it takes to close out a se…Read More Nature vs. Nurture Tip 2: Scan Frequently and Consistently
When conducting research for this year???s State of Software Security report, we looked at how ???nature??? and ???nurture??? contribute to the time it takes to close out a security flaw. For the ???nature??? side, we looked at attributes that we canno…Read More Nature vs. Nurture Tip 1: Use DAST With SAST
As a security professional reading through version 11 of our State of Software Security (SOSS) report, the first statistic that probably stands out to you is that 76 percent of applications have security flaws. It???s encouraging to see that only 24 pe…Read More State of Software Security v11: How to Use the Findings
Last year, the PCI Security Standards Council published the PCI Secure Software Standard and the PCI Secure Software Lifecycle (Secure SLC) Standard as a part of a new PCI Software Security Framework (SSF), also referred to as PCI S3. The SSF offers ob…Read More New PCI Regulations Indicate the Need for AppSec Throughout the SDLC
Over the past year, the financial services industry has been challenged with pivoting its operations to a fully digital model, putting the security of its software center stage. Despite the unanticipated pivot, our recent State of Software Security v11…Read More In the Financial Services Industry, 74% of Apps Have Security Flaws
Veracode???s Chris Wysopal and Chris Eng joined Enterprise Strategy Group (ESG) Senior Analyst Dave Gruber and award-winning security writer and host of the Smashing Security podcast, Graham Cluley, at Black Hat USA to unveil the findings from a new ES…Read More A Software Security Checklist Based on the Most Effective AppSec Programs
Veracode has been officially recognized by Gartner Peer Insights as a 2020 Customers??? Choice for Application Security Testing. The report includes Veracode???s aggregate score of 4.6 out of 5 stars out of 95 independent customer reviews (as of July 3…Read More Hot off the Press: Veracode Named a 2020 Gartner Peer Insights Customers’ Choice for AST
October is cybersecurity awareness month, and this year, the overarching theme is ???Do Your Part. #BeCyberSmart.??? When considering what ???cybersmart??? means in application security, we realized we unearthed some data this year that made us a littl…Read More 5 Lessons About Software Security for Cybersecurity Awareness Month
Most modern codebases are dependent on open source libraries. In fact, a recent research report sponsored by Veracode and conducted by Enterprise Strategy Group (ESG) found that more than 96 percent of organizations use open source libraries in their c…Read More 96% of Organizations Use Open Source Libraries but Less Than 50% Manage Their Library Security Flaws
When investing in an application security (AppSec) program, you expect to see a return on your investment. But in order to recognize a return, your organization needs to determine what success looks like and find a way to measure and prove that the pro…Read More Focus on Fixing, Not Just Finding, Vulnerabilities
Technology is constantly changing and advancing. Payment platforms are no exception. As these new platforms emerge, the software supporting the platform must be reliable and secure. Without secure payment platforms, payment transactions and data could …Read More The Migration From PA-DSS to SSF: Everything You Need to Know
When it comes to application security (AppSec), it???s important to note that no one testing type can uncover every flaw. Each tool is designed with a different area of focus, along with various speeds and costs ??? so it???s necessary to employ a mix …Read More AppSec Tools Proliferation Is Driving Investments to Consolidate
In light of the current pandemic, most organizations will be working remotely for the foreseeable future. But the increase in virtual operations has led to a higher volume of cyberattacks.
Now, more than ever, it???s vital that your organization is ar…Read More Gartner Summit: Balance Risk, Trust, and Opportunity in an Uncertain World
Veracode recently sponsored Enterprise Strategy Group???s (ESG) survey of 378 developers and security professionals, which explored the dynamic between the roles, their trigger points, the extent to which security teams understand modern development, a…Read More 69% Say Their AppSec Is Effective but Don’t Have Tools to Measure It