Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Veracode

The Power of Manual Penetration Testing in Securing Your Attack Surface

When it comes to protecting software, don’t count on automated testing to find all the vulnerabilities in your code. Here’s why manual penetration testing is more essential (and more accessible) than one might think.

How Government Agencies Can Secure Mission Critical Software in the Cloud

Government agencies are instructed by Executive Order to improve the delivery of digital services to citizens while also safeguarding critical data and systems. Often, this leads to a difficult decision between speed of application production and software security. However, as recent events have shown, sacrificing security in the name of speed compromises the safety of citizens and government infrastructure.

Why Security is Central to Citizen Experience Part 3: A Helping Hand from the Private Sector

Building trust in government is both my passion and part of my character. Last year, when I found myself contemplating my next career move, I knew that I wanted to be at an innovative company devoted to rebuilding trust in federal agencies. It didn’t take long for me to realize that Veracode and I were a perfect fit. Immediately I saw how the company’s mission and innovative application-security technology aligned with my values.

Why Security is Central to Citizen Experience Part 2: The Changing Cyber Landscape of Government

Throughout my career, I’ve seen a lot of change in the realm of cybersecurity. Whether in private- or public-sectors, from pre- to post-pandemic, I’ve witnessed the struggles of agencies coming to terms with digital transformation and cybersecurity. What I’ve found is that federal agencies are expected to keep pace with their civilian counterparts while abiding by mandates to add an extra layer of security to digital operations.

Why Mitigate Flaws to Manage Risk: Advice from an Application Security Consultant

Documenting flaws that you don't prioritize today will save you time should they become high-severity flaws in the future. Here's the best way to approach them. The topic of mitigations is a commonplace source of questions and discussion for our Application Security Consulting group.

Manufacturing Overtakes Financial Services As The Sector With Fewest Software Security Flaws

72 percent of applications contain vulnerabilities, and 12 percent are considered 'high severity' - the lowest of all industries analyzed. Sector still has room for improvement, with some of the lowest and slowest fix rates, especially for open-source flaws.

Despite Lowest Software Flaw Frequency, Manufacturing's Fix Times Lag and Create Ransomware Risk

In 2021, manufacturing became cybercriminals’ most targeted industry as a surge in global ransomware attacks disrupted manufacturing operations and exacerbated supply chain woes. This put even more pressure on manufacturing organizations that were already feeling the heat. Recognizing that ransomware attacks can stem back to software vulnerabilities, many manufacturers are exploring ways to strengthen their software security programs.

How Azalea Health Ensures Customer Trust with Cloud-based Software Security

As head of the product department at Azalea Health, I need to understand what our market needs. Based on the conversations that we've had with hospitals and clinics, enterprise-grade security is something they desperately need but rightfully expect their EHR system to provide. That’s why it’s important for our organization to take the responsibility of securing health data off their shoulders.