Jenny Buckingham

Jenny Buckingham

Jenny Buckingham is a Product Marketing Manager helping developers and security professionals secure their cloud-native application development. With a focus on understanding her customer’s needs, she helps companies leverage powerful solutions to overcome security challenges.

Stay up to date on Application Security

Posts by Jenny Buckingham
  • Security Debt: A Growing Threat to…
    | By Jenny Buckingham

    Understanding Security Debt Security debt is a major and growing problem in software development with significant implications for application security, according to Veracode's State of Software Security 2024 Report. Let’s delve a bit deeper into the scope and risk of security debt, and gain some…

    Read Article
     
  • Integrating Veracode DAST Essentials…
    | By Jenny Buckingham

    In today's fast-paced digital landscape, developers face increasing pressure to deliver secure applications within tight deadlines. With the emphasis on faster releases, it becomes challenging to prioritize security and prevent vulnerabilities from being introduced into production environments.…

    Read Article
     
  • Practical Steps to Prevent SQL…
    | By Jenny Buckingham

    In today's digital landscape, web applications and APIs are constantly under threat from malicious actors looking to exploit vulnerabilities. A common and dangerous attack is a SQL injection. In this blog, we will explore SQL injection vulnerabilities and attacks, understand their severity…

    Read Article
     
  • A Getting Started Guide to Veracode…
    | By Jenny Buckingham

    The Critical of Role of Dynamic Application Security Testing (DAST) Web applications are one of the most common vectors for attacks, accounting for over 40% of breaches, according to Verizon's Data Breach Report. Dynamic application security testing (DAST) is a crucial technique used by…

    Read Article
     
  • Introducing Dynamic Analysis MFA:…
    | By Jenny Buckingham

    Veracode has recently introduced a new feature called Dynamic Analysis MFA, which provides automated support for multi-factor authentication (MFA) setups during dynamic analysis scans. This eliminates the need for you to disable or manually support your MFA configurations when conducting security…

    Read Article
     
  • Securing JavaScript: Best Practices and…
    | By Jenny Buckingham

    JavaScript is the most commonly-used programming language, according to the most recent StackOverflow developer survey. While JavaScript offers great flexibility and ease of use, it also introduces security risks that can be exploited by attackers. In this blog, we will explore vulnerabilities in…

    Read Article