Veracode

Results: 75



#Item
1

Microsoft Word - EMEA41026016.docx

Add to Reading List

Source URL: www.veracode.com

- Date: 2016-02-25 10:37:44
    2

    How Do Vulnerabilities Get Into Software

    Add to Reading List

    Source URL: www.veracode.com

    - Date: 2016-07-20 14:35:01
      3

      Veracode_Infographic_JourneyAdvanced_FINAL

      Add to Reading List

      Source URL: www.veracode.com

      - Date: 2016-07-21 17:00:55
        4

        Veracode Survey Report .qxp_Layout:32 PM Page 1 A 2015 SURVEY REPORT Cybersecurity and Corporate Liability:

        Add to Reading List

        Source URL: www.ciosummits.com

        - Date: 2016-07-20 10:19:21
          5Computer security / Security / Computing / Veracode / Software testing / Web application firewall / Application security / Vulnerability / Application firewall

          Veracode Runtime Protection

          Add to Reading List

          Source URL: www.veracode.com

          Language: English - Date: 2016-06-03 14:45:23
          6Computer security / Computing / Security / Veracode / Software testing / Application security / Vulnerability / Cloud computing

          HIGHLIGHTS A state government meets compliance requirements and reduces risk in a scalable application

          Add to Reading List

          Source URL: www.veracode.com

          Language: English - Date: 2015-06-03 10:46:07
          7Computer security / Security / Information governance / Cyberwarfare / Veracode / Corporate governance / Chief information security officer / Cyber-security regulation

          VERACODE Survey Report.qxp_Layout:52 PM Page 1 Cybersecurity in the Boardroom A 2015 SURVEY

          Add to Reading List

          Source URL: www.ciosummits.com

          Language: English - Date: 2016-07-20 10:16:39
          8Computing / Computer security / Cyberwarfare / Hacking / Computer network security / Software testing / Vulnerability / OWASP / Secure coding / Application security / Cross-site scripting / Defensive programming

          Combating the Top 4 Sources of Software Vulnerabilities

          Add to Reading List

          Source URL: www.veracode.com

          Language: English - Date: 2016-07-20 15:52:45
          9Software testing / Veracode / Computer security / Vulnerability / Application security / Wind River Systems

          Press Release Investment in Automated Security Testing Tools Ramping Rapidly, According to VDC Research Demand for improved software security and quality is rising sharply across both the embedded and enterprise/IT marke

          Add to Reading List

          Source URL: www.vdcresearch.com

          Language: English - Date: 2016-03-03 10:07:19
          10Computer network security / Software testing / Hacking / Computer security / Veracode / Common Weakness Enumeration / Vulnerability / Application security / Security testing / Software quality / CVSS / Software bug

          Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

          Add to Reading List

          Source URL: owncloud.com

          Language: English - Date: 2016-04-06 15:04:57
          UPDATE