Hi [[ session.user.profile.firstName ]]

Veracode

  • Date
  • Rating
  • Views
  • 10 Full Stack Developer Commandments - Software Engineering Done Securely
    10 Full Stack Developer Commandments - Software Engineering Done Securely
    Chris Campbell, Solution Architect at Veracode Recorded: May 16 2019 39 mins
    The full stack developer is likely to play an increasingly important part in the future of web development, especially as the field continues to increase in scope and complexity. A developer who can communicate about and work on a website’s look and feel as well as manipulating data and managing its backend will offer a great deal of value to development teams and organisations.

    As applications continue to be the #1 vector for attackers seeking to breach enterprise security, the full stack developer must have a working knowledge of application security best practices. When writing code for web applications, developers must be able to avoid threats such as a cross site scripting vulnerability or Java SQL injection. Superior developers will also know how to integrate app security testing into the development process.

    Join Chris Campbell - Solution Architect at Veracode - for this live webinar, where he will delve into how a full stack engineer creates secure software from the start.
  • How to Scale Your Dynamic Analysis Program
    How to Scale Your Dynamic Analysis Program
    Bipin Mistry, Director of Product Management, Veracode Recorded: May 15 2019 48 mins
    Web applications continue to be the primary attack vector for hackers looking to breach organizations, and applying dynamic application security testing (DAST) gives you security assurance for how your application will perform in the real world. The key is applying it to your organization's entire application portfolio without slowing down delivery.

    What will you learn?

    Dynamic analysis is an important solution in a mature application security program because this form of testing more easily unearths different kinds of vulnerabilities, including information leakage, cryptographic issues, and cross-site scripting. You know that it’s important to secure all of your organization’s web applications - including the ones you didn't know you owned - while ensuring speed to market to meet customer demands and expectations. This is where Veracode comes in. Watch this webinar to learn how to implement a dynamic analysis program that meets these four key criteria:

    •Scalability: The ability to scan multiple applications at once - whether they're authenticated or unauthenticated - to keep security from being a bottleneck.
    •Discovery: Uncover every web application associated with your organization, even if you didn’t create it in-house, to create an exhaustive inventory.
    •Speed: Deliver high-quality results quickly, and in a smart way that saves time.
    •Automation & Integration: Scans that run automatically and integrate with existing processes and tools keep your security and development teams moving quickly.
  • Securing the Sugar out of Azure DevOps Pipeline
    Securing the Sugar out of Azure DevOps Pipeline
    Colin Domoney DevSecOps Consultant at Veracode Recorded: May 9 2019 44 mins
    This webinar will provide a comprehensive look at the security features of the Azure DevOps CD/CD platform. The topics include built-in security features such as user access controls and branch policies; and an overview of best practice for the incorporation of various 3rd party security tooling such as Veracode Greenlight within your pipeline.

    Other topics include best practices for pipeline telemetry, reporting, pipeline protection and templates for security best practices. Whether you are a software developer using Azure DevOps, a security manager or a DevOps expert this webinar should further enhance your expertise in secure software delivery with Azure DevOps.

    Register for this live webinar where Colin Domoney - DevSecOps Consultant at Veracode - will leave you with a clear understanding of how to Secure your DevOps Pipeline.
  • Making Applications and Docker Containers Secure with Veracode
    Making Applications and Docker Containers Secure with Veracode
    Julian Totzek-Hallhuber, Solutions Architect at Veracode Recorded: Apr 30 2019 45 mins
    Containerisation of software is helping firms to completely change how applications are deployed to meet the demands of the business. The technology has the potential to radically reduce the cost of ownership of capability, and puts enormous power in the hands of the DevOps engineer.

    These benefits also change the nature of how risk may need to be addressed in the development lifecycle. Not only does the software application need to meet the security standards of the organisation within the Docker Container, but also the base image needs to be free from exploitable vulnerabilities.

    Join Julian Totzek-Hallhuber - Solution Architect at Veracode - for this live webinar where he will explore approaches that embrace the secure use of containers in pipelines.
  • Integrating Application Security Into Your Development Environment
    Integrating Application Security Into Your Development Environment
    Pej Pourmousa, Vice President Security Program Management, Veracode and Johnny Wong, Director Presales, Veracode Recorded: Mar 27 2019 41 mins
    Once you define, adopt and standardize application security best practices for protecting your software, the next step is to determine how your program integrates into your existing environment. The Veracode Platform integrates with the development, security and risk-tracking tools you already use. Coupled with our broad range of APIs, your teams can create your own custom integrations or leverage those from open source community.

    Join Pej Pourmousa, Vice President Security Program Management at Veracode and Johnny Wong, Director Presales, Veracode for a webinar that will outline the ways your organization can integrate application security into your development environment. Specifically he will discuss how Veracode integrates into your development and DevOps processes using:
    •Integrated Development Environments (IDEs)
    •Build Servers
    •Defect Tracking Systems
    •APIs
  • Prove your company’s secure software practices with Veracode Verified
    Prove your company’s secure software practices with Veracode Verified
    Asha May, Customer Engagement, Veracode and Scott Mitchell, Security Architect, Blue Prism Recorded: Mar 14 2019 44 mins
    According to IDG, 84% of surveyed IT Leaders agree that their companies are concerned about the potential data security risk posed by third-party applications. How can companies assure customers that they will protect their critical data while maintaining a competitive advantage in the market?

    Join Asha May, Director Customer Engagement at Veracode as she provides an overview and latest highlights of how the Verified program has been helping our customers provide third party software assurance. Learn how Veracode works with software providers to:

    •Meet the demands of customers looking for proof that your software is secure
    •Provide a path to maturing their AppSec program
    •Help defend their AppSec budget by showing the value and adoption it brings
    •Verify the secure development process around an application by focusing on continuous AppSec integrated into development
    •Make their secure software a competitive advantage in a tightening market
  • How To Survive a Data Breach
    How To Survive a Data Breach
    Chris Roberts (Attivo Networks), Matthew Rose (Checkmarx), Chris Eng (Veracode), Nathan Wenzler (Moss Adams) Recorded: Mar 5 2019 48 mins
    "Data breaches continuing to make the headlines and enterprises are no longer questioning ""if"" a breach will occur, but ""when."" With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important.

    Join security thought leaders and experts for an interactive Q&A to learn more about:
    - Today’s cybersecurity threat landscape
    - The true costs of a breach
    - Preventing breaches: Key factors to consider
    - Why early breach detection is critical
    - How to develop an effective incident response plan and get C-Suite buy-in
    - How to keep your company secure in 2019"
  • Lo Stato Della Sicurezza Informatica: Guardando all’Europa
    Lo Stato Della Sicurezza Informatica: Guardando all’Europa
    Giuseppe Trovato, Principal Security Researcher at Veracode Recorded: Mar 5 2019 45 mins
    Il software ha cambiato il modo in cui comunichiamo, forniamo assistenza sanitaria, gestiamo affari, gestiamo i nostri governi, eleggiamo i nostri leader, diamo inizio a rivoluzioni e persino stimoliamo il cambiamento sociale. Nel mondo digitale, la creazione di software contribuirà a stimolare la crescita economica e migliorare la qualità della vita. Ma il nostro più grande catalizzatore per il cambiamento è rappresentato anche dalla fonte della vulnerabilità.

    Quando si tratta di assicurare il software che sviluppano, le aziende europee sono molto indietro rispetto alle loro controparti americane. IIn questo webinar dal vivo, presentato da Giuseppe Trovato, Principal Security Researcher per Veracode, verranno presentati i dati del rapporto annuale sullo stato della sicurezza del software, con particolare attenzione al modo in cui le società europee si confrontano con le società aventi sede negli Stati Uniti. Il software viene creato avendo il mente la sua utilizzabilita’ e le sue prestazioni, ma anni di dati, insieme a violazioni su violazioni, dimostrano che il software non è stato creato pensando alla sicurezza.
  • The State of Software Security: Looking at Europe
    The State of Software Security: Looking at Europe
    Paul Farrington, Director of Solutions Architects at Veracode Recorded: Feb 28 2019 32 mins
    Software has changed the way we communicate, provide healthcare, conduct business, run our governments, elect our leaders, mount revolutions and even spur social change. In the digital world, the creation of software will help spur economic growth, and improve our quality of life. But our greatest catalyst for change is also the source of vulnerability.

    When it comes to securing the software they develop, European companies are far behind their American counterparts. In this live webinar, Paul Farrington, Director of Solutions Architects at Veracode, will present data from the annual State of Software Security Report, with a focus on how European companies compare to U.S.-based companies. Software is created with usability and performance in mind, but years of data, along with breach after breach demonstrates that software is not created with security in mind.
  • Kickstart Your Application Security Program
    Kickstart Your Application Security Program
    Melissa Francis, Security Program Manager at Veracode Recorded: Feb 27 2019 17 mins
    You have taken the first step toward the fight against the proliferation of software vulnerabilities. Now is the time to define, adopt and standardize application security best practices for protecting software, data and users. With the right technology and program in place, you can implement application security best practices- such as testing, defining code standards, and creating standard policies- that integrate into the workflow of your development teams.

    Join this webinar to hear one of Veracode’s security program experts will show you how to define your application security programs and establish best practices in a simple and cost-effective way. Based on first-hand experience with onboarding customers, you will acquire practical tips on integrating security into the software development lifecycle- all the way to scaling an application security program using our cloud-based platform.

Embed in website or blog