Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Veracode

3 Key Takeaways from the State of Software Security 2023 Report

It’s one of our favorite times of the year – the unveiling of our annual State of Software Security (SoSS) report. Software security issues can have devastating effects on organizations, damaging their financial stability and reputations. That’s why our research this year centered on a crucial question: what can be done to avoid introducing security flaws in the first place?

Install Greenlight Visual Studio Extension

In this video, you will learn how to install the Veracode Greenlight for Visual Studio extension. Veracode Greenlight finds the defects in your code as you write it and provides recommendations and code examples to help you fix them directly in your IDE. It allows you to write quality secure code from the very beginning while perfecting your understanding of application security Best Practices.

What We've Learned About Reducing Open-source Risk Since Log4j

I share a birthday with the Log4j event. However, unlike this event, I’ve been around for more than one year. On December 9th, 2021, a Tweet exposed a zero-day vulnerability in Log4j, a widely-used piece of open-source software. The announcement made headlines everywhere, and cybersecurity was suddenly put in the spotlight. It was a wake-up call for many because, in an instant, software that had been considered secure was suddenly at tremendous risk.

Despite Security Scrutiny on Tech Industry, Nearly One-fourth of Applications Have High-severity Flaws

The United States, United Kingdom and other governments around the globe are making strides to defend against software supply chain attacks and strengthen the cybersecurity resilience of their departments, partners, and stakeholders.

Configure the API Credentials File on Windows

In this video, you will learn how to generate Veracode API credentials in the Veracode Platform and configure an API credentials file for storing your API credentials on Windows. Veracode API credentials consist of an ID and secret key. You use these credentials to access the Veracode APIs and Veracode integrations. API ID and key authentication provides improved security and session management for accessing the APIs.

As the Holiday Season Begins, 73% of Retail and Hospitality Apps Have a Flaw

After the pandemic upended the retail and hospitality industries, digital transformation became imperative to survival – the key to meeting ever-changing customer expectations and overcoming supply chain complexities. As the landscape continues to shift, 55 percent of retailers say they’re open to improving their innovation capabilities, while 51 percent want to adopt new business models.

Anatomy of a Stored Cross-site Scripting Vulnerability in Apache Spark

One of the services that Veracode offers is a consultation with an Application Security Consultant – a seasoned software developer and application security expert. In the context of a consultation, my team works with the software engineers of Veracode’s customers to understand and, ideally, remediate security flaws found by the Veracode tool suite.

4 Reasons Scan Results May Differ Over Time: Advice from an Application Security Consultant

You didn’t change anything in your code, yet the scan is different this time. Here’s advice from an Application Security Consultant on why that may be. Have you ever wondered why you scan code one day and get one result, and then scan the same code a month later and get different results – even though you never changed anything?