Information Security Research Library

Powered by Bitpipe.com

All Research Sponsored By:Veracode, Inc.

  • ROI and Benefits of a Cloud-Based Application Security Service

    In this report from Forrester Research, Inc., discover the potential ROI you could achieve by deploying a cloud-based application security service. Explore the costs and risk of this technology, and weigh them with the benefits you could experience.

  • 8 Patterns of Secure Agile Teams

    Secure application development can be challenging for Agile teams, as short Agile sprints don't lend themselves well to the time-consuming process of finding and fixing application vulnerabilities. In this white paper, discover eight best practices for integrating security and Agile development.

  • Appropriate Third Party Software Security Controls

    This informative whitepaper explores the appropriate security controls for your third party services and software.

  • Understanding the Risks of Mobile Applications

    View this white paper for a primer on the mobile application security landscape. Explore the top risks for mobile applications and learn what you can do to mitigate them in your enterprise.

  • Ten Tips for Building a Successful Vendor Application Security Program

    If you rely on commercial, outsourced, cloud and mobile applications, you need a plan for vendor security compliance. In this resource, get 10 tips for building a successful vendor application security plan.

  • Streamline Compliance with Cloud-based Application Security

    This white paper introduces a cloud-based application security platform that assesses mobile, web, and third-party applications for standard controls and ensures compliance with OX, HIPAA, NIST 800-53, MAS, and other mandates.

  • Mobile Application Security Survey Results

    In this resource, explore the results of a survey on mobile application security. See what security threats businesses are most concerned about, how they're managing applications for end-users, and what security policies, practices, and test they implement.

  • Behavioral Analysis: Why it's Key to Mobile App Security

    In this brief case study, learn how Veracode, an application security company, dealt with security testing for the third-party development of a custom mobile app for iOS and Android. Discover what happens when a security risk is identified, and learn the key steps to decision-making in response.

  • Global 100 Manufacturer Reduces Risk Across 30,000 Domains in 8 Days

    Many globally-operating enterprises suffer from the same problem: identifying and securing web applications over tens of thousands of IP addresses. This brief case study illustrates how one global 100 manufacturer overcame this challenge by transitioning to a cloud-based application security platform.

  • Magic Quadrant for Application Security Testing

    Choosing the right software security testing tool can be an overwhelming process. In this Gartner report, make your decision a little easier with a comparison of the top app security testing vendors on the market, including IBM, HP, Veracode, Aspect, and more.

  • Global Bank Scales Application Security Program

    Like many companies, one global bank wanted to transform their security program with a centralized platform that ensured consistency across app development teams. In this case study, discover how the bank leveraged a cloud-based platform to analyze and secure hundreds of business-critical applications at the speed they desired.

  • Application Security 101

    View this white paper for a guide to modern application security with a focus on why software development teams should be trained in secure development techniques.

  • Addressing the Scalability Challenge of Application Security with Veracode

    In this white paper, discover a simpler, more scalable approach to application security across your entire infrastructure -- including web, mobile, and third-party apps. Read now to learn how this cloud-based platform helps overcome five common security challenges.

  • Building Security into the Agile SDLC: View from the Trenches

    In this webinar, learn how to build security into the Agile software development lifecycle (SDLC) first hand from two security and development professionals. Discover how they were able to make security part of core development efforts and get executive support to build a more secure SDLC.

  • A Pragmatic Approach to Benchmarking Application Security

    In this webcast, a pragmatic approach is introduced to benchmark application security.

  • Successful Application Security Testing for Agile Development

    Find out how one leading vendor is working to provide only the best coding practices and application security testing, so businesses like you can make sure your applications are safe and secure.

  • Delivering Secure SaaS Solutions

    Find out how one vendor is designing, implementing, maintaining and auditing security in every layer of their cloud-based services to make sure their customers are happy and their mission-critical, confidential applications remain safe.

  • Five Program Management Best Practices

    Find out how program management helped one company achieve a successful application security program.

  • Disclosures 2012 - The Vulnerability of Publicly Traded Companies

    In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.

  • Top 10 Mobile Application Risks

    In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.

  • Understanding the risks of mobile apps

    Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.

  • Expert guide to understanding SaaS and cloud computing issues

    This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.

  • State of Software Security Report Volume 4

    Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.

  • Musings on the PSN Attack Vector

    Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.

  • Dirty Little Secrets: Mobile Apps Invading Your Privacy

    Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.