Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Secure the Supply Chain with Center for Internet Security (CIS) and Tripwire

Events like the recent Sunburst/SolarWinds and Florida water plant breaches serve as a reminder that the supply chain needs to be secured just as much as your organization’s in-house infrastructure. Protecting the supply chain is a matter of implementing the right cybersecurity controls to your multi-vendor environment, such as the 20 Center for Internet Security (CIS) Controls.

Create and Manage API Service Accounts with the Identity API

In this video you will learn how to use the Identify REST API command to: Veracode REST APIs enable you to access Veracode Platform data and functionality using REST API programming conventions. The API provides endpoints for managing users, teams, and business units, using the create, update, read, and delete actions on their respective objects. It also provides a consistent way of onboarding teams by scripting the process from start to finish.

Product Demo | Managed Vendor Risk Assessments

Produce accurate vendor assessments using UpGuard's new Managed Vendor Risk Assessments module. Contact support@upguard.com to learn more UpGuard is a complete third-party risk and attack surface management platform, managing cyber risk across attack surfaces and third-party vendors by proactively identifying security exposures.