Information Security Research Library

Powered by


The risks that vendor supplied software can pose to the integrity of your business' security are significant. Vendors and partners may not utilize SDL practices, code can be full of critical vulnerabilities and back doors, and confidential data could be left unprotected.

In this webinar, Chenxi Wang of Forrester Research and Chad Holmes of Veracode will show you how to mitigate the risks of vendor supplied software. Topics include mobile apps and data security, third-party security practices, and enterprise security best practices.

Brought to you by Veracode


Chenxi Wang is vice president and principal analyst serving security & risk professionals at Forrester Research, Inc. She is a leading expert on mobile security, endpoint security, application security, and cloud security. Her research builds on her in-depth technical insights and her years of research experience.

Chad Holmes is director of sales enablement at Veracode. He has over ten years of software development and application security experience, and has lead the redesign and execution of the third-party analysis process to allow for a more streamlined approach while still addressing common ISV intellectual property concerns.



Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.