<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Secure software design tips</title>
	<atom:link href="http://www.epanorama.net/blog/2014/09/03/secure-software-design-tips/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/09/03/secure-software-design-tips/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 04 Apr 2026 09:03:13 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/03/secure-software-design-tips/comment-page-1/#comment-1226031</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 12 Sep 2014 09:19:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27224#comment-1226031</guid>
		<description><![CDATA[Veracode gets $40M to help companies find security holes in their applications
https://gigaom.com/2014/09/11/veracode-gets-40m-to-help-companies-find-security-holes-in-their-applications/

Veracode’s service hooks into the development tools used by coders so that its cloud-based system can scan their application for vulnerabilities or bugs in the code.

What makes Veracode different than the recent torrent of security startups that have been raising cash is how its technology aims to strengthen the development process of applications rather than providing network-monitoring services like RiskIQ or identity management features like Okta. Brennan said he believes that many of the security breaches today occur by taking advantage of holes in the design and source code of the application itself, especially as these apps are dealing with lots of data flowing in and out.

“The world views of security and development are different; one is focussed on building things and one is focussed on monitoring,” Brennan said. 

After scanning the application, Veracode can tell whether or not a development team has been introducing SQL injection errors and other common security bugs. It then reports that information back to the developers so that they can properly patch up their system.

“We run the program to tell them what has been remediated and what hasn’t,”]]></description>
		<content:encoded><![CDATA[<p>Veracode gets $40M to help companies find security holes in their applications<br />
<a href="https://gigaom.com/2014/09/11/veracode-gets-40m-to-help-companies-find-security-holes-in-their-applications/" rel="nofollow">https://gigaom.com/2014/09/11/veracode-gets-40m-to-help-companies-find-security-holes-in-their-applications/</a></p>
<p>Veracode’s service hooks into the development tools used by coders so that its cloud-based system can scan their application for vulnerabilities or bugs in the code.</p>
<p>What makes Veracode different than the recent torrent of security startups that have been raising cash is how its technology aims to strengthen the development process of applications rather than providing network-monitoring services like RiskIQ or identity management features like Okta. Brennan said he believes that many of the security breaches today occur by taking advantage of holes in the design and source code of the application itself, especially as these apps are dealing with lots of data flowing in and out.</p>
<p>“The world views of security and development are different; one is focussed on building things and one is focussed on monitoring,” Brennan said. </p>
<p>After scanning the application, Veracode can tell whether or not a development team has been introducing SQL injection errors and other common security bugs. It then reports that information back to the developers so that they can properly patch up their system.</p>
<p>“We run the program to tell them what has been remediated and what hasn’t,”</p>
]]></content:encoded>
	</item>
</channel>
</rss>
