Did You Read Our Most Popular 2018 Blog Posts?

Every January, we get a lot of valuable insights by looking back at our most popular blog posts in the previous year, and 2018 was no exception. The posts that resonated the most last year paint a clear picture of topics most important to the security and development communities – from open source risk, to using AppSec as a competitive differentiator, to security’s new role in a DevOps world. The popularity of these posts highlights the big application security questions and concerns on the minds of security professionals and developers in 2018.

Open source risk still a major concern

Just as in the previous couple years, open source risk was a hot AppSec topic in 2018. Applications are increasingly composed of more open source code than first-party code, and that trend has serious security implications. A blog about the trends in open source security and two blogs about 2018 breaches related to open source code were featured in our top-10 most popular blogs:

Trends in Open Source Security

New Apache Struts Vulnerability Highlights Need for Software Composition Analysis

How to Prevent a Breach from Spring Break

Software security becomes a competitive differentiator

We’ve started to hear organizations talk about the need to use application security as a competitive differentiator. If their software is secure, and the competition’s isn’t, they’ve got an edge. In fact, we launched our Verified program last year to address this need. Increasingly, quality software means secure software, and customers now consider quality in terms of both functionality and security. Not surprisingly, this blog on the topic by our VP of Engineering Maria Loughlin garnered a lot of attention last year:

Software Quality Is a Competitive Differentiator

Security needs to expand its development knowledge

Security’s role is changing as DevOps models take hold. As security shifts left and moves into earlier phases of the development lifecycle, security teams need to work much more closely with development teams and, in turn, require more than a surface understanding of developers’ priorities and processes. This blog that outlines details of that understanding resonated with our readers this year:

Security: Here’s What You Need to Know About Development

Did you miss any of these posts last year? Don’t miss a thing in 2019; subscribe to our blog.

RSS | Veracode Blog

Are you looking for products for hacking, cybersecurity, and penetration testing? Do you need to cleanse your smartphone, PC, or website from viruses and malware? Do you need to track down a person or recover urgent information? Do you need to regain control of an account, email, or password that has been stolen from you? Interested in purchasing pre-configured devices to easily and quickly experiment with hacking techniques? Do you have specific requirements in software or hardware? We can assist you!

Contact us immediately for immediate assistance: provide us with details via email or WhatsApp about the type of support you need, and we will respond you promptly!

Fill out and submit the form below to send us an immediate support request

Write your email address here

Write here how we can help you - we provide immediate support for all your needs!