Veracode, Inc., a leader in securing the world’s software, acquired by CA Technologies (NASDAQ:CA), announced the evolution of CA Veracode Verified, a program that provides third-party validation of a company’s secure software developing processes.
With approximately 30 per cent of all breaches occurring as a result of a vulnerability at the application layer, software purchasers are demanding more insight into the security of the software they are buying. CA Veracode Verified empowers software vendors to demonstrate their commitment to creating secure software.
New research conducted with International Data Group (IDG) found that 84 per cent of software buyers include security requirements in new vendor contracts. Prospects and existing customers are more discerning than ever before when it comes to the security of the software being purchased, and without a means of demonstrating proof of security, organisations risk experiencing delayed or lost revenue. The CA Veracode Verified program provides several benefits to companies participating in the program, including:
• A road-map for adopting and maturing an application security program tied to practical outcomes and business value for the Modern Software Factory.
• Third-party attestation from an industry leader that an application has undergone security testing as part of the development process. This can help streamline the sales process to proactively address security concerns.
• A focus on the secure coding process, not just a point-in-time release, to embrace DevSecOps and the rapid delivery pace of DevOps and Agile development methods.
• A means of ensuring that third party software purchased or used meets a high standard of application security, to reduce enterprise risk.
“As software becomes a bigger component of value in all industries, every company is driven to become a modern software factory. Security becomes a competitive advantage as companies learn to create and buy high-quality, secure software. Too often we’re seeing security sacrificed to accommodate the speed of business,” said Chris Wysopal, chief technology officer, CA Veracode. “The result is insecure software that causes extraordinarily damaging breaches. The CA Veracode Verified program provides both a road-map towards secure software development and a quick means of determining the commitment to security made by potential software vendor. The program seal highlights organisations that make secure software development a competitive advantage by showing that they adopted a mature application security program that covers the entire SDLC.”
Successful application security is more than just scanning and fixing security flaws, it’s about a change in processes and procedures to embed security into the entire development process. CA Veracode Verified focuses on implementation of secure coding practices, not just recording point-in-time scans, which makes it ideal for today’s DevOps and Agile methods, where releases happen at very high frequency and security must be fully integrated throughout the lifecycle. The CA Veracode Verified program recognises three levels of maturity to help organisations and consumers understand the security posture of the software they purchase and use. The maturity levels are based on more than 12 years of software security trend data pulled from the CA Veracode Platform. This data provides best practices to help create a secure development process that minimizes vulnerabilities and reduces the risk of a breach.
To learn more about CA Veracode Verified, click here.
To read the full research report conducted in conjunction with IDG, click here.
About CA Veracode Veracode, CA Technologies application security business, is a leader in helping organizations secure the software that powers their world. Veracode’s SaaS platform and integrated solutions help security teams and software developers find and fix security-related defects at all points in the software development lifecycle, before they can be exploited by hackers. Our complete set of offerings help customers reduce the risk of data breaches, increase the speed of secure software delivery, meet compliance requirements, and cost effectively secure their software assets- whether that’s software they make, buy or sell.
Veracode serves over 1,600 customers across a wide range of industries, including nearly one-third of the Fortune 100, three of the top four U.S. commercial banks and more than 20 of Forbes’ 100 Most Valuable Brands. Learn more at www.veracode.com, on the Veracode blog, on Twitter and in the CA Veracode Community.
Legal notice Copyright © 2017 Veracode, Inc. All rights reserved. All other brand names, product names, or trademarks belong to their respective holders.
Media Contact: Helen Reiher Hill+Knowlton Strategies Ph: 02 9286 1294 M: 0408 774 766 E: firstname.lastname@example.org
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.