Hi [[ session.user.profile.firstName ]]

Veracode

  • Date
  • Rating
  • Views
  • How to Tackle Security in the CI/CD Pipeline
    How to Tackle Security in the CI/CD Pipeline Colin Domoney, Consultant Solutions Architect - Veracode Recorded: Aug 15 2017 34 mins
    Introducing security testing technology into the CI/CD pipeline can often affect the throughput of the pipeline due to the time in which it takes to complete.

    Join this webinar to understand:
    •Where in the pipeline is best to introduce security testing
    •How to handle security exceptions
    •How to adjust security testing tools based on critical applications
  • Developer-Friendly Security with Veracode Greenlight
    Developer-Friendly Security with Veracode Greenlight Lupita Carabes, Solutions Architect at Veracode Recorded: Aug 9 2017 15 mins
    With the shift to DevOps, application security testing is becoming an integral part of the developer’s job. Successfully securing code in the development stage increases speed to market and reduces cost – but developers can resist security testing that’s disruptive to their workflow.

    Join this 20 minute webinar to see how Veracode Greenlight finds security defects in your code and provides contextual remediation advice to help developers fix issues in seconds, right in the IDE. So you can release secure code at the speed of DevOps.
  • Gain Visibility into Your Open Source Risk with Veracode Software Composition An
    Gain Visibility into Your Open Source Risk with Veracode Software Composition An Jacob Martel, Solution Architect, Veracode Recorded: Jul 31 2017 15 mins
    Most development organizations don’t have the time or the resources to create every application from scratch, so they rely on third-party software and integrate open source components into their internally developed software. However, securing open source components is challenging for many security professionals because they lack visibility into what components are in use where in their organizations.

    At Veracode we know it can be difficult to pinpoint applications using vulnerable open source components. In this 30 minute webinar find out how Veracode Software Composition Analysis can help you:

    •Assess proprietary and open source code in a single scan
    •Build an inventory of your third-party components
    •Gain visibility into which applications have a vulnerable version of a component
    •Identify and remediate vulnerabilities to help comply with industry regulations
  • The Top 4 Ways Vulnerabilities Get Into Your Software
    The Top 4 Ways Vulnerabilities Get Into Your Software Colin Domoney, Consultant Solutions Architect - Veracode Recorded: Jul 25 2017 32 mins
    Why is software so riddled with security defects? Are developers to blame? Is it just the nature of software? We’ve found that there are four primary ways that vulnerabilities end up in your software. Understanding these sources and how to prevent them is a good first step in making your apps less like a red carpet for cyberattackers, and more like a moat.

    Benefits of attending:
    1.Learn how vulnerabilities are getting in your code and how to keep them out from a VP of Engineering
    2.Gain actionable tips and advice on application security– from a development manager who lives it day to day
    3.Move beyond the buzz about the insecurity of open source components – what is the solution?
    4.Identify the best ways to help developers learn to code more securely
    5.Gain insight from the latest research into which languages are introducing what vulnerabilities
  • How to Ensure Your Code Meets Policy Compliance
    How to Ensure Your Code Meets Policy Compliance Jonathan Harper, Solutions Architect, Veracode Recorded: Jul 18 2017 28 mins
    Enable your developers to quickly identify and remediate security-related code defects throughout your SDLC without having to manage a tool. Veracode’s patented static analysis technology analyzes major frameworks and languages without requiring source code, so you can assess the code you write, buy or download, and measure progress in a single platform. Sign up for this 20 minute Static Analysis webinar to learn best practices for:
    •Integrating static analysis into your development process
    •Complying with internal and external security policies
    •Creating policies for your application security program
    •Evaluating code against policy before check-in
    •Analyzing results and reporting capabilities (flaw viewer)
    •Defining user roles and team views within the platform
  • Security at Speed: Integrating AppSec into the Tools you Already Use
    Security at Speed: Integrating AppSec into the Tools you Already Use Tim Jarrett, Sr. Director, Product Marketing Recorded: Jun 21 2017 56 mins
    Did you know the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you already use? And our flexible APIs allow you to create your own custom integrations or use community integrations, built by the open source community.

    Join us for a webinar as we explore ways in which you can use integrations to help you go faster, without sacrificing security. Below are a few ways Veracode can integrate into your Agile and DevOps processes:

    • Integrated Development Environments (IDEs)
    • Build Servers
    • Defect Tracking Systems
    • Governance, Risk and Compliance Solutions
  • The Role of DevOps in Reducing the Likelihood of a Data Breach
    The Role of DevOps in Reducing the Likelihood of a Data Breach Amy DeMartine, Principal Analyst, Security & Risk, Forrester & Bhavna Sarathy, Principal Product Manager, Veracode Recorded: May 30 2017 48 mins
    Security breaches continue to make headlines and negatively impact the reputation and bottom line for many businesses. According to Cybersecurity Ventures, global annual cybercrime costs will double between now and 2021. More than 50% of all cyberattacks target the software application layer* and the number of these attacks grows at a rate of about 25% per year**.

    Enter DevOps- a delivery approach that focuses on continuous software delivery and gives organizations an opportunity to reduce overall security risks in applications. It offers development teams the ability to introduce security earlier in the development lifecycle so they can identify and address vulnerabilities faster.

    While traditional methodologies typically introduce security during later phases of development, DevOps enables security visibility across the lifecycle to decrease discovery and remediation time.

    In this webinar, guest speaker Amy DeMartine, Principal Analyst at Forrester Research and Bhavna Sarathy, Principal Product Manager at Veracode will provide an overview of the current state of cybersecurity and the DevOps movement, how security is changing the way that software is being built and deployed, and the technologies and best practices organizations should consider in order to reduce the likelihood of a data breach. Specific topics addressing the threat of data breaches to be discussed include:

    • The organizational gaps that both security and development teams are currently tackling with regards to data breach prevention

    • Practical steps both teams can take to transition to a secure DevOps environment

    • Leveraging technologies such as Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle
  • NY DFS Cyber Regulations: What You Need to Know
    NY DFS Cyber Regulations: What You Need to Know Tim Jarrett, Sr. Director, Product Marketing & Tim Mathias, Cyber Security Executive Recorded: May 16 2017 56 mins
    The New York State Department of Financial Services new Cybersecurity Regulations went into effect on March 1. These regulations, which cover financial services companies licensed by or operating in New York State, are more comprehensive and prescriptive than other cybersecurity regulations to date, and are most likely a taste of regulations to come. In particular, they introduce requirements around application security that are more specific and wide-ranging than most. What do financial services companies need to know about these regulations?

    This webinar will get those affected by these requirements up to speed on:
    > What the new regulations entail
    > How best to approach these requirements
    > How Veracode can help with compliance
  • Beyond Deployment Velocity: How Technology & Process Increase DevOps Success
    Beyond Deployment Velocity: How Technology & Process Increase DevOps Success Adrian Lane, CTO, Securosis, Jeff Craty, Dir. of Engineering, Veracode, & Tim Jarrett, Sr Dir. of Product Mktg at Veracode Recorded: Apr 25 2017 61 mins
    DevOps increases teamwork, visibility and overall software quality. Yet, integrating security can be challenging for cultural and technological reasons.

    This webinar, featuring Adrian Lane of Securosis and Tim Jarrett and Jeff Cratty of Veracode, dives into what DevOps is, explain how delivering secure code lends itself to the larger goals of DevOps, and discusses the challenging process and technical requirements for integrating security into DevOps.

    Learn how you can have both development velocity and security without compromising either one.
  • How to Apply DevOps in a Regulated Organisation
    How to Apply DevOps in a Regulated Organisation Colin Domoney, Sr Product Innovations Manager Recorded: Apr 20 2017 36 mins
    With the mainstream adoption of DevOps, what does this mean for heavily regulated industries, such as financial services? How can an organisation that requires a clear segregation of duties between Dev and Ops, as well as strict regulations adopt the DevOps way?
    Join this webinar for an optimistic view of how Dev(Sec)Ops can be applied in such challenging environments as well as examples of industry best practices.

Embed in website or blog