Veracode

Veracode

By embedding into your existing software development workflow, Veracode ensures that security assessments and vulnerability remediations are completed during logical points throughout your development cycle.

Stay up to date on Application Security

Posts by Veracode
  • Musings of a Former State CTO Part 1:…
    | By Veracode

    For decades, Claire Bailey has crusaded to combat threats to IT devices and networks. Her journey began in the early 1980s when a devastating personal experience inspired her to improve the system. Claire’s father died of a heart attack in 1980 amid a heatwave hitting their rural Texas town. The…

    Read Article
     
  • DevSecOps in Practice: How to Embed…
    | By Veracode

    You’ve heard of DevOps. And by now, you’ve probably also heard of DevSecOps, which extends DevOps principles into the realm of security. In DevSecOps, security breaks out of its “silo” and becomes a core part of the DevOps lifecycle. That, at least, is the theory behind DevSecOps. What’s often more…

    Read Article
     
  • Automated Security Testing for…
    | By Veracode

    Today, more than ever before, development organizations are focusing their efforts on reducing the amount of time it takes to develop and deliver software applications. While this increase in velocity provides significant benefits for the end users and the business, it does complicate the process…

    Read Article
     
  • Preventing CSRF Attacks
    | By Veracode

    Cross-site request forgery (CSRF, sometimes pronounced “sea surf” and not to be confused with cross-site scripting) is a simple yet invasive malicious exploit of a website. It involves a cyberattacker adding a button or link to a suspicious website that makes a request to another site you’re…

    Read Article