Veracode

Results: 75



#Item
41ColdFusion / Web development software / Veracode / Macromedia JRun / Adobe Flex / OWASP / Macromedia / Computing / Software / Adobe software

Deconstructing ColdFusion Chris Eng and Brandon Creighton CanSecWest – March 11, 2011 Hi

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2011-03-11 11:57:06
42Espionage / Backdoor / Rootkit / Code injection / Veracode / Loadable kernel module / Hooking / Eval / Self-modifying code / Malware / System software / Cyberwarfare

Static Detection of Application Backdoors Chris Wysopal, Chris Eng Veracode, Inc. Burlington, MA USA [removed], [removed] Abstract— This paper describes a high level classification of

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2014-02-11 00:25:06
43Ethics / Computer security / Data security / Data breach / L0pht / Uber / Identity theft / Internet privacy / Chris Wysopal / Security / Computer network security / Secure communication

Details of 50,000 Uber drivers breached The Financial Times By Sarah Mishkin February 27, 2015 The personal information of about 50,000 Uber drivers has been accessed by an unknown third party, in one of the largest data

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-03-03 18:14:01
44Security / Cyberwarfare / Computer crimes / Electronic warfare / National security / Cyber spying / Hacker / Computer security / Cyberwarfare in the United States / Cybercrime / Hacking / Computing

[removed]Chinese hackers attack blue-chip groups via Forbes website - FT.com Home Africa

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-02-10 14:55:33
45Cyberwarfare / Application firewall / Magic Quadrant / Vulnerability management / Application security / Firewall / Web application security / Veracode / Cyberoam / Computer network security / Computer security / Computing

Press release Paris, July 15, 2014 Application security market at a turning point, according to DenyAll Customers around the world are investing in application security to facilitate and secure

Add to Reading List

Source URL: www.denyall.com

Language: English - Date: 2015-02-18 07:43:38
46Software testing / Computer network security / Cloud computing / Veracode / Vulnerability / Application security / Cross-site scripting / Penetration test / Software bug / Computer security / Cyberwarfare / Computing

CUSTOMER SUCCESS EXAMPLE: For a Global 2000

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2014-04-28 11:00:59
47

About the Speaker Tom Eston Manager, Penetration Testing, Veracode Tom Eston is the Manager of Penetration Testing at Veracode. Tom currently leads a team of highly skilled penetration testers focused on web and mobile a

Add to Reading List

Source URL: www.infosec-world.com

- Date: 2015-01-23 11:27:22
    48Molecular biology / Biotechnology / Laboratory techniques / DNA / SNP genotyping / Illumina / Genotyping / Polymerase chain reaction / International HapMap Project / Biology / Chemistry / Genetics

    TECHNICAL NOTE: Illumina® SNP GENOTYPING GoldenGate® Genotyping with VeraCode® Technology Custom 48-, 96-, 144-, 192-, and 384-plex SNP genotyping assays for high-throughput screening, biomarker validation, and routi

    Add to Reading List

    Source URL: uthscsa.edu

    Language: English - Date: 2009-03-18 16:18:00
    49Malware / Debuggers / Computer security / Control flow / Hooking / DLL injection / Rootkit / Dynamic-link library / OllyDbg / Computing / Software / System software

    Detecting “Certified Pre-owned” Software Tyler Shields, Veracode Chris Wysopal, Veracode March 25, 2009 Introduction

    Add to Reading List

    Source URL: blackhat.com

    Language: English - Date: 2014-12-16 19:06:30
    50Management / Ethics / Computer security / Cloud computing / Veracode / Risk management / Vulnerability assessment / Social vulnerability / Vulnerability / Security / Actuarial science / Risk

    SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc.

    Add to Reading List

    Source URL: www.rsaconference.com

    Language: English - Date: 2013-05-29 13:27:50
    UPDATE