Veracode

Displaying 1-6 of 6 results

  • Case Studies // Jun 2010

    Barclays Application Security Assurance Project

    As one of the leading global financial services institutions, Barclays, like many of its peers, relies heavily on a number of third-party commercial software and outsourcing providers to help drive its core banking systems. They wanted to build a joint business case that would demonstrate a win-win for all parties...

    Provided By Veracode

  • White Papers // Apr 2009

    IT Risk Management: Guide to Software Risk Assessments and Audits

    The software industry is one of the largest manufacturing industries in the world, with $350 billion in off-the-shelf software sold each year and over $100 billion in customized code on top of that. Despite the size, there is no standardized notion of software security quality even though the repercussions include...

    Provided By Veracode

  • White Papers // Oct 2008

    Application Security & OCC Bullet in 2008-16: A Blueprint for Compliance

    Recently, the Comptroller of the Currency (OCC) took the extraordinary step of issuing a bulletin (OCC Bulletin 2008-16) to alert financial institutions of the risks posed by insecure software and recommend steps banks should take to reduce risk and protect their critical data. The OCC guidance is well timed with...

    Provided By Veracode

  • White Papers // Jul 2008

    Guide to PCI Application Security Compliance for Merchants and Service Providers

    Triggered by a number of security breaches and concerns over the abuse and theft of credit card data, major credit card companies including American Express, Discover, JCB, Master Card and Visa formed the PCI Security Standards Council (PCI SSC) in September 2006. The PCI Data Security Standard (PCI DSS) delineates...

    Provided By Veracode

  • White Papers // Jul 2008

    Five Steps to Secure Outsourced Application Development

    Application security has risen to the top of the agenda for security professionals striving to control their company's overall risk profile. According to Gartner and the Computer Emergency Response Team (CERT), 75% of new attacks target the application layer and software vulnerabilities have reached an all time high - with...

    Provided By Veracode

  • White Papers // Jul 2008

    Automating Your Code Review: Moving to a SaaS Model for Application Security

    Today's application has become the enterprise's ''New Perimeter''. With better network?-level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points - the application. While hackers were once satisfied with defacing Web sites, unleashing denial-of-service attacks and trading illicit files...

    Provided By Veracode

  • White Papers // Jul 2008

    Guide to PCI Application Security Compliance for Merchants and Service Providers

    Triggered by a number of security breaches and concerns over the abuse and theft of credit card data, major credit card companies including American Express, Discover, JCB, Master Card and Visa formed the PCI Security Standards Council (PCI SSC) in September 2006. The PCI Data Security Standard (PCI DSS) delineates...

    Provided By Veracode

  • White Papers // Jul 2008

    Five Steps to Secure Outsourced Application Development

    Application security has risen to the top of the agenda for security professionals striving to control their company's overall risk profile. According to Gartner and the Computer Emergency Response Team (CERT), 75% of new attacks target the application layer and software vulnerabilities have reached an all time high - with...

    Provided By Veracode

  • White Papers // Jul 2008

    Automating Your Code Review: Moving to a SaaS Model for Application Security

    Today's application has become the enterprise's ''New Perimeter''. With better network?-level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points - the application. While hackers were once satisfied with defacing Web sites, unleashing denial-of-service attacks and trading illicit files...

    Provided By Veracode

  • White Papers // Apr 2009

    IT Risk Management: Guide to Software Risk Assessments and Audits

    The software industry is one of the largest manufacturing industries in the world, with $350 billion in off-the-shelf software sold each year and over $100 billion in customized code on top of that. Despite the size, there is no standardized notion of software security quality even though the repercussions include...

    Provided By Veracode

  • White Papers // Oct 2008

    Application Security & OCC Bullet in 2008-16: A Blueprint for Compliance

    Recently, the Comptroller of the Currency (OCC) took the extraordinary step of issuing a bulletin (OCC Bulletin 2008-16) to alert financial institutions of the risks posed by insecure software and recommend steps banks should take to reduce risk and protect their critical data. The OCC guidance is well timed with...

    Provided By Veracode

  • Case Studies // Jun 2010

    Barclays Application Security Assurance Project

    As one of the leading global financial services institutions, Barclays, like many of its peers, relies heavily on a number of third-party commercial software and outsourcing providers to help drive its core banking systems. They wanted to build a joint business case that would demonstrate a win-win for all parties...

    Provided By Veracode