Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

MuddyWater Strikes: New Malware Threats Amid Tensions

February 23, 2026

Massive Data Breach: Ransomware Group Steals 8TB in U.S. Record

February 23, 2026

Securing the Future: 2025’s Biggest AI Security Breach

February 23, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Veracode Unveils New Innovations for Cloud-Era Security
Uncategorized

Veracode Unveils New Innovations for Cloud-Era Security

Staff WriterBy Staff WriterJuly 26, 2025No Comments4 Mins Read9 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Advanced AI-Powered Solutions Reduce Remediation Time While Proactively Blocking 60% of Critical Supply Chain Threats

Veracode, a global leader in application risk management, unveiled a suite of innovations that transform how enterprises approach security. The enhanced platform cuts vulnerability remediation time by up to 92 percent, while using proactive defense to prevent 60 percent of critical supply chain risk from ever entering organizations. These latest enhancements to Veracode’s Package Firewall and Risk Manager provide assurance, context, and continuity across the software development lifecycle.

“Security teams tell us they’re drowning in vulnerability alerts while missing the risks that actually matter. Our latest innovations flip the script—instead of endless firefighting, teams can now prevent threats proactively and focus remediation efforts where they’ll have maximum business impact,” said Derek Maki, Head of Product at Veracode.

Cyber Technology Insights : ISG Recognizes GTT as a Leader in SASE and Managed SD-WAN Across U.S. and U.K.

Redefining Application Risk Management with End-to-End Risk Visibility

The latest enhancements to Veracode’s Application Risk Management platform enable security teams to identify and remediate vulnerabilities with greater speed and precision than ever before. Veracode Risk Manager sets a new standard for application security posture management (ASPM), featuring six new integrations with industry leaders, including Wiz. By aggregating and prioritizing issues across all sources, Risk Manager reduces vulnerability remediation time by up to 92 percent. This holistic view empowers security teams to act on the Best Next Action™—the actions that reduce the most risk—with precision.

Securing the Software Supply Chain

With 70 percent of critical security debt stemming from third-party code, enterprises are under unprecedented pressure to safeguard their software supply chains. Regulations like the European Union’s Digital Operational Resilience Act (DORA) highlight the vital role of open-source security in maintaining software supply chain integrity.

Veracode Package Firewall redefines supply chain security with an automated solution that blocks untrusted packages, before they can infiltrate development pipelines. Powered by advanced AI analysis, Package Firewall identifies and blocks 60 percent more malicious packages than competing solutions, effectively preventing vulnerabilities, malware, and policy violations from entering organizational systems.

Paired with Software Composition Analysis (SCA) and Malicious Package Detection, Veracode Package Firewall significantly reduces the risk of supply chain attacks by finding and neutralizing libraries harboring malicious code.

“Veracode Package Firewall represents a fundamental shift in how we think about supply chain security. While others are still alerting malicious packages after they’re in your codebase, we’re blocking them at the gate. This means security teams can finally get ahead of supply chain threats instead of scrambling to respond when legitimate packages get compromised or malicious packages slip through,” said Maki.

Built on proprietary threat intelligence, the product automates real-time risk management to ensure nefarious files and programs never make it into an organization’s codebase.

Cyber Technology Insights : NETSCOUT Delivers Double-Digit Energy Savings for Data Center Observability Solutions

Empowering Developer Productivity with Frictionless Security

According to Gartner, Inc., organizations with a high-quality developer experience are 33 percent more likely to attain their business goals and 31 percent more likely to improve delivery flow. Veracode continues to champion developer productivity through an enhanced platform experience, featuring improved Integrated Developer Environment (IDE) plugins and new Git integrations that embed enterprise-level security directly into workflows.

“Developer productivity isn’t just a nice-to-have; it directly impacts your ability to ship secure software at market speed. Our IDE integrations deliver enterprise-grade security insights without the context switching that kills developer flow. This is why we’re seeing 35 percent faster remediation times with our IDE plugins and integrations, including Visual Studio, IntelliJ IDEA, and Eclipse, as well as GitHub, GitLab, and Azure DevOps,” said Maki.

Veracode’s latest developer-focused innovations eliminate operational inefficiencies and simplify workflows, removing unnecessary complexity from day-to-day DevSecOps processes. Additional innovations include:

AI-Assisted Login for Dynamic Application Security Testing (DAST): Automates complex authentication flows, reducing script setup time by 50 percent and expanding dynamic testing coverage.

Container and Infrastructure-as-Code (IaC) Results: Centralizes container and IaC findings in the Veracode Platform, streamlining vulnerability management.

Veracode Fix Usage Analytics: Provides a dashboard that tracks usage and Common Weakness Enumerations (CWEs) addressed, offering insights by IDE, project, and source file to optimize remediation.

Cyber Technology Insights : Tenable Launches AI-Enhanced Vulnerability Prioritization for Unmatched Precision

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: businesswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSygnia Finds Chinese Threat Actor Hitting Critical Systems
Next Article Daily CyberTech Highlights: Essential News and Analysi
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

RiskRubric.ai Unveils Groundbreaking AI Model Risk Leaderboard

September 19, 2025

RegScale Secures $30M+ to Transform Cyber GRC

September 19, 2025

Cybersecurity Leaders Brace for Surge in Nation-State Attacks by 2025

September 19, 2025
Leave A Reply Cancel Reply

Latest Posts

Massive Data Breach: Ransomware Group Steals 8TB in U.S. Record

February 23, 2026

Securing the Future: 2025’s Biggest AI Security Breach

February 23, 2026

13 Ways Attackers Exploit Generative AI to Breach Your Systems

February 23, 2026

Threat Actors Peddling WhatsApp Crash Exploit on Hacking Forums

February 23, 2026
Don't Miss

RiskRubric.ai Unveils Groundbreaking AI Model Risk Leaderboard

By Staff WriterSeptember 19, 2025

Essential Insights Launch of RiskRubric.ai: The Cloud Security Alliance and partners have introduced RiskRubric.ai, the…

RegScale Secures $30M+ to Transform Cyber GRC

September 19, 2025

Cybersecurity Leaders Brace for Surge in Nation-State Attacks by 2025

September 19, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • MuddyWater Strikes: New Malware Threats Amid Tensions
  • Massive Data Breach: Ransomware Group Steals 8TB in U.S. Record
  • Securing the Future: 2025’s Biggest AI Security Breach
  • 13 Ways Attackers Exploit Generative AI to Breach Your Systems
  • Threat Actors Peddling WhatsApp Crash Exploit on Hacking Forums
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

MuddyWater Strikes: New Malware Threats Amid Tensions

February 23, 2026

Massive Data Breach: Ransomware Group Steals 8TB in U.S. Record

February 23, 2026

Securing the Future: 2025’s Biggest AI Security Breach

February 23, 2026
Most Popular

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

July 8, 202510 Views

The CTEM Conversation We All Need

June 30, 202510 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.