english

Managing Remote Workstations with Active Directory Domain Joins

As more organizations adapt to remote work options, supporting employees will require more than just providing tools and enforcing policies. With many employees suddenly working from home, there are things an organization can do to help their teams remain productive without increasing cybersecurity risks. While employees in this new remote work situation will be thinking

Maintaining the Health of Your Active Directory Infrastructure

Active Directory (AD) is the backbone of your enterprise Microsoft infrastructure, providing authentication and authorization for every critical resource across your environment. Maintaining the health of your production AD environment is key to its performance, availability and security, and also crucial for preventing roadblocks to significant IT changes like adding new applications, network upgrades, cloud

How to Migrate 10,000 Users a Week

Laying the proper foundation to migrate 10,000 email users on a weekly basis is much like building a house or in this case a factory. The most successful builders know that planning, staging and choosing the right tools and materials are more important to achieving success than the construction itself. There is no difference when

How To Video: How to Use SCA to Keep up with the Demand for Software

Have questions about application security or the software development process? We’ve got you covered. In this Veracode How-to Series, we’re gathering some of the most common questions (and answers) from customers and Veracode community members so that you can learn the ‘Hows’ and the ‘Whys’ before they become roadblocks for your team.  Watch this video

How To Video: How to Use Analytics to Measure ROI

In this episode of our How-To Series, Anne Nielsen, Principal Product Manager at Veracode, breaks down the ways analytics can help you and your team move your AppSec program forward with data-driven insights. Those insights prove your everyday security efforts to stakeholders and help you see where you may need to give your security procedures

After Years of Security Prioritization, How Do You Finally Protect Lingering Vulnerabilities?

Inconsistency Creates Scalability and Coverage Issues With a comprehensive AppSec program, you want to understand your entire development, security, and application footprint so you can roll out consistent tools and processes. Download this whitepaper to learn: • Importance and risk don’t correlate: Many organizations prioritize protection for the most critical applications. However, attackers circumvent this

Magic Quadrant for Application Security Testing

Modern application design and the continued adoption of DevSecOps are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by seamlessly integrating and automating AST in the software delivery life cycle. Strategic Planning Assumptions By 2025, 70% of attacks against containers