Three Ways to Align with the White House’s Cybersecurity Recommendations
The global pandemic and more recent geo-political events have brought an even greater focus on the threat of cyber attacks on individuals …
The global pandemic and more recent geo-political events have brought an even greater focus on the threat of cyber attacks on individuals …
The responsibility of training developers in secure coding best practices usually falls on security practitioners. Security practitioners …
It has officially been one year since the release of the Biden administration’s Executive Order on Cybersecurity, which outlines security …
Most software today isn’t developed entirely from scratch. Instead, developers rely on a range of third-party resources to create their …
Ready to secure government applications? Start with Zero …
My name is Claire Bailey, the Vice President of Government Affairs at Veracode. My team recently asked me to describe technology policy, …
Application Programming Interface (API) attacks are set to become one of the most prevalent cyberattacks with a broad target range. By …
On March 29, 2022, details of a zero-day vulnerability in Spring Framework (CVE-2022-22965) were …
You hear a lot about shifting your application security (AppSec) left – in other words, shifting AppSec to the beginning of the software …
What is SQL injection? A SQL injection flaw allows for an attacker to modify or inject SQL syntax into the request to make the application …
It seems as if we’re encountering new cyber threats every day — and the severity of their impact is growing. We now routinely deal with …
The 12th volume of our annual State of Software Security (SOSS) report is now live! Rather than examining a single year of activity …
This interview was cross-posted from the Veracode Community. With his third consecutive championship in the Secure Coding Challenge – the …