Veracode

Results: 75



#Item
11Computer security / Computing / Cyberwarfare / Hacking / Computer network security / Veracode / Application security / Cross-site scripting / Vulnerability / Cross-site request forgery / JavaScript / Web application security

WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding. “On our current

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-01-20 16:34:29
12

Case Study: United Online Challenges Chose WhiteHat over: IBM Veracode Qualys

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2016-06-16 12:54:09
    13Hacking / Computer network security / Computer security / Veracode / Application security / Cross-site scripting / Vulnerability / Cross-site request forgery / JavaScript / Web application security

    WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding. “On our current

    Add to Reading List

    Source URL: www.veracode.com

    Language: English - Date: 2016-01-20 16:34:29
    14

    Case Study: Advance Loan Technologies Challenges Chose WhiteHat over: Veracode Motivated to invest in an application security solution for the following reasons: For compliance

    Add to Reading List

    Source URL: www.whitehatsec.com

    Language: English - Date: 2016-06-16 11:22:36
      15

      CRACKING THE CODE ON APPLICATION SECURITY BUY-IN How to Work With Teams in Your Organization to Make AppSec a Success

      Add to Reading List

      Source URL: www.veracode.com

      Language: English - Date: 2016-01-07 12:14:21
        16

        APPLICATION SECURITY PROGRAM CHECKLIST AN APPLICATION SECURITY MANAGER’S STEP-BYSTEP REFERENCE TO IMPLEMENTING AN ADVANCED APPLICATION SECURITY PROGRAM Phase 1: Pilot Program ‡‡

        Add to Reading List

        Source URL: www.veracode.com

        Language: English - Date: 2015-12-17 13:38:51
          17

          How Do Vulnerabilities Get Into Software? WHAT’S INSIDE

          Add to Reading List

          Source URL: www.veracode.com

          Language: English - Date: 2016-02-12 12:20:04
            18

            PDF Document

            Add to Reading List

            Source URL: www.veracode.com

            Language: English - Date: 2015-12-18 10:08:01
              19

              STATE OF SOFTWARE SECURITY Volume 6: Focus on Industry Verticals JUNE 2015

              Add to Reading List

              Source URL: www.veracode.com

              Language: English - Date: 2015-07-07 11:52:10
                20

                FOR  IMMEDIATE  RELEASE     SecureKey Technologies a Winner of Veracode’s Inaugural Secure Development Award

                Add to Reading List

                Source URL: securekey.com

                Language: English - Date: 2013-11-18 10:01:27
                  UPDATE