You searched for Veracode/ | Page 2 of 11 | SC Media

Your search for Veracode/ returned 104 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Older than 2 years remove

Your search for Veracode/ returned 104 results

Sort Results:

Relevant Recent
Disclosures 2012: The Vulnerability of Publicly Traded Companies
Vendor Webcasts

Disclosures 2012: The Vulnerability of Publicly Traded Companies

The proliferation of cyber attacks that we have witnessed in the past year has sparked intense interest in the disclosure of cybersecurity risks by public companies. Public companies are subject to greater compliance requirements, generally have more funding, and were recently encouraged by the SEC to disclose material cybersecurity risks in their SEC filings.

Can bug hunters keep the internet safe?

This crafty infographic dissected into a slideshow, uniquely illustrates a popular industry topic. With so many bug bounty programs, are they affective enough to create a safer internet?Source: Veracode
Vendor Webcasts

NYSE survey: Understanding cybersecurity in the boardroom

The connection between cybersecurity and a company's bottom line is crystal clear to board members — and they're worried. In fact, more than 80 percent of corporate directors now discuss cybersecurity at most or all boardroom meetings.

Blogger Awards

The winners of the most popular security blog, best corporate security blog and "five to follow" on Twitter.

Google Apps has its advantages, but is it secure?

Can Google guarantee safe, secure online word processing and spreadsheet collaboration applications to enterprises? While only time will tell, the short answer appears to be yes. Google's new Google Apps Premier Edition — which offers enterprise-focused versions of Gmail, Google Talk instant messenger, Google Calendar, Docs & Spreadsheets, Page Creator, and Start Page via the Web — is really nothing more than software as a service (SaaS), or on-demand offering, popularized by and others.
Next post in Network Security