Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Pat Romanski, Elizabeth White, Yeshim Deniz, Liz McMillan

News Feed Item

Veracode to Host Webinar on Merging Network and Application Risk Assessment Techniques for Powerful Vulnerability Discovery

Veracode, Inc., the leader in cloud-based application security testing, today announced details of the upcoming webinar “Crafting Super-Powered Risk Assessments,” co-hosted by Chris Wysopal, co-founder, CTO and CISO of Veracode, and Gordon MacKay, executive vice president and chief technology officer at Digital Defense, Inc. Attendees will learn how enterprises can better understand and reduce security risks when assessing the state of network and application security.

Who: Gordon MacKay, EVP and CTO, Digital Defense, Inc.
Chris Wysopal, co-founder, CISO and CTO, Veracode

What: Traditional risk assessment techniques alone are often siloed and not effective enough to secure the enterprise. Network and application assessments respectively contribute to the overall security architecture of an organization, but by combining the two crucial tasks, enterprises can benefit exponentially—gaining increased visibility and responding more rapidly to vulnerabilities.

Join Gordon MacKay and Chris Wysopal as they discuss the benefits and challenges of network and application risk assessment methods. They will discuss how to combine these two methods for a super-charged risk assessment program.

Additional discussion topics include:

  • The impact of third party applications on the software supply chain.
  • The actions an enterprise should take when web applications and web infrastructure are found to be outdated, and the unnecessary security risk they bring to the enterprise.
  • How to determine which applications within your company’s software inventory should be tested.

When: Wednesday, November 14, 2012 at 1:00 p.m. ET

How: To attend the webinar, please visit: https://info.veracode.com/SuperChargedAssessments_Registration.html.

About Veracode

Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics, Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide representing Global 2000 brands. For more information, visit www.veracode.com, follow on Twitter: @Veracode or read the Veracode Blog.

About Digital Defense

Founded in 1999, Digital Defense, Inc. (DDI) is the premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries. DDI’s dedicated team of experts helps organizations establish a culture of security through regular information security assessments, awareness education and Decisive Security Intelligence. This proven method bolsters the capability of organizations to reduce risk and keep information, intellectual property and reputations secure. The combination of DDI’s certified Security Analysts, patent-pending scanning technology and proprietary cloud-based vulnerability management system, Frontline Solutions Platform, delivers the most powerful assessment results and remediation management solutions possible.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-centric compute for the most data-intensive applications. Hyperconverged systems already in place can be revitalized with vendor-agnostic, PCIe-deployed, disaggregated approach to composable, maximizing the value of previous investments.
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the steps so your team's apps not only function but also can be monitored and understood from their machine data when running in production.
A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organizers to pass great deals to great conferences, helping you discover new conferences and increase your return on investment.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure using the Kublr platform, and how Kubernetes objects, such as persistent volumes, ingress rules, and services, can be used to abstract from the infrastructure.