You searched for Veracode/ | SC Media

Your search for Veracode/ returned 118 results

Your search for Veracode/ returned 118 results

Sort Results:

Relevant Recent

Shifting security right: Know what you own

There are a number of reasons unknown or unlogged web applications continue to live in portfolios- including M&A activity resulting in acquired web assets, and the proliferation of the digital landscape with marketing promotional sites. Ultimately, the very thing meant to draw attention to your brand and boost your bottom line is the same target attackers go after to infiltrate your organization.
Security News

Historic hacking group members dish on Julian Assange, Beto O’Rourke

The Black Hat conference in Las Vegas reunited three important figures in the history of famed 35-year-old hacking group Cult of the Dead Cow (cDc), including one member who made his first-ever appearance under his actual name. But the real name-dropping began when the group members shared their thoughts on another former member, Democratic presidential…
Security News, Vulnerabilities

Intel, industry scramble to mitigate ZombieLoad side-channel processor vulnerability

Four new CVEs that combine to create a vulnerability called ZombieLoad affecting Intel processors were made public today, which if left unpatched could leave a computer open to a side-channel attack allowing someone to bypass protections to read memory. The flaws, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091, impacted a number of companies with Apple, Google, Microsoft and…
Coding for app security.
InfoSec Insider

Common Application Vulnerabilities You Should Know About

While patching vulnerabilities seems like a “low-hanging fruit” task for many security practitioners, it seems as though many still fail to do so. In this interview with application security expert Chris Eng, he highlights the common blind spots associated with vulnerability management.

Hacked elections impact.
InfoSec Insider

How Hacked Elections Impacted the Security Industry

CA Veracode’s Chris Wysopal discusses how the 2016 presidential election hack broadened the horizon on how security warriors think about defending their data and offers up advice on what they should consider when it comes to protecting sensitive information.

Executive Insight

What the Trump Administration Can Do to Boost Software and IoT Security

Last May, President Trump ordered his administration to come up with a plan for securing the U.S. government and the nation’s infrastructure from cyberattacks that threaten the country’s economy and national security.  Under the order, the President tasked the Secretary of Commerce and the Secretary of Homeland Security to identify and promote action by stakeholders…
Next post in Network Security