IE11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.
VeraCode 1.png

Veracode delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves application security from inception through production so agencies can confidently innovate with the web and mobile applications they build, buy and assemble including the components they integrate into their environments.

Veracode: Empowering Texas Government to Build Secure Citizen Services

  • Veracode enables the State of Texas to Assess, Mitigate and Attest to Application Security Compliance in a Static and Dynamic Environment.
  • Veracode is an application security scanning tool that can be run automatically, identify critical issues if any exist, and assist developers with expert guidance to correct any security vulnerabilities.
  • Veracode will scan your applications that are developed in-house, third-party applications, or any combination of application development. We work with your Application Team and your Security Team to ensure vulnerabilities are identified and corrected.
  • Veracode can help you identify application vulnerabilities before citizens do… and most importantly before hackers do. If your Application Development Team needs help in correcting the vulnerability, we are available around the clock, 24/7, to assist in your application security coding, testing and mitigation.
  • Veracode enables your government workforce with the strongest application security training available through your Veracode subscription.
  • Veracode ensures your citizen information and data is protected throughout your citizen services with Veracode.
  • For additional information, contact Jeff Fuson: jfuson@veracode.com. Check out: https://www.veracode.com/solutions/government
Today, I’m proud to share our 14th annual State of Software Security report. Our 2024 report shines a spotlight on the pressing issue of security debt in applications, and it provides a wake-up call to organizations worldwide. The demand for speed and innovation has resulted in the accumulation of risk known as security debt. As Chief Research Officer at Veracode, I’m deeply committed to empowering businesses to confront the challenges posed by security debt. Let’s dive in.
As a CISO, securing web applications and ensuring their resilience against evolving cyber threats is a non-negotiable priority. Verizon’s Data Breach Investigations Report 2023 cites web applications as the top attack vector by a long shot (in both breaches and incidents). Here’s a simplified checklist for securing web applications that will help you improve your organization’s security posture and the integrity of your technology.
To secure our world, Cybersecurity Awareness Month encourages four steps that make it easy to stay safe online. As a CISO, my team and I advocate for these practices constantly within our organization. If you are a security practitioner looking to bolster cybersecurity awareness, here’s a brief look at how we explain these steps to help make staying safe online easier.
Unlike in the 1800s when a safety brake increased the public’s acceptance of null, null was accepted by the public much before guardrails came to be. “null had 1 million users within the first five days of being available,” shares null. Almost a year later, on October 30, 2023, null “to ensure that America leads the way in seizing the promise and managing the risks of artificial intelligence (AI).” Here’s what the Executive Order gets right about addressing cybersecurity risk and promise posed by AI.
Cloud-based Platform Exposes Vulnerabilities to Help Improve Reliability of Public Sector Software
Veracode’s State of Software Security (SOSS) Volume 12 examines historical trends shaping the software landscape and how security practices are evolving along with those trends. The data collected from 20 million scans across half a million applications suggests that we’re making good progress toward the goal of producing more secure software.
Product Announcement
Over 30 Percent of Applications Contain Flaws at First Scan; By Five Years, Nearly 70 Percent of Apps Have At Least One Flaw
Scanning via API, Hands-on Security Training, and Scan Frequency Identified as Key Factors to Reduce Flaw Introduction Over Time
The Cybersecurity Evolution