Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

We Asked 100+ AI Models to Write Code. Here's How Many Failed Security Tests.

If you think AI-generated code is saving time and boosting productivity, you’re right. But here’s the problem: it’s also introducing security vulnerabilities… a lot of them. In our new 2025 GenAI Code Security Report, we tested over 100 large language models across Java, Python, C#, and JavaScript. The goal? To see if today’s most advanced AI systems can write secure code. Unfortunately, the state of AI-generated code security in 2025 is worse than you think.

Fortify Your Software Supply Chain with Veracode

Cyber attacks on the software supply chain are soaring, putting your applications and your business at unprecedented risk. But what if you could fortify your defenses, accelerate innovation securely, and stay ahead of every threat? Veracode Supply Chain Security helps you protect your organization from supply chain attacks with a powerful, unified approach to protecting your supply chain.

Shifting from Vulnerability Management to Security Risk Prioritization with AI

The adage ‘an ounce of prevention is better than a pound of cure’ applies to AppSec vulnerability management. Traditionally, AppSec has focused on a reactive ‘curing flaws’ paradigm, identifying and fixing vulnerabilities after they have occurred. However, the never-ending escalation between threats and security leads to alert fatigue and security debt.

Engineers Speak: Veracode Static Application Security Testing (SAST) and Software Composition Analysis (SCA) Recognized as a Platinum Vendor

We’re thrilled to share some exciting news that truly validates our mission to secure the world’s software: Veracode has been recognized as a leading vendor in both Static Analysis (SAST) and Software Composition Analysis (SCA) in the June 2025 VDC Research Vendor Impact Awards! What makes this recognition even more significant is that these awards are based on aggregated ratings from VDC Research’s global “Voice of the Engineer” survey.

ASPM for Highly-Regulated Industries: Meeting the Demands of Healthcare, Finance, and Energy

Software security vulnerabilities in healthcare, finance, energy, and other critical infrastructure industries have far-reaching consequences across global supply chains and markets. Highly regulated industries face complex attack vectors and require a broader defense-in-depth strategy to effectively manage application risk. That’s where the right Application Security Posture Management (ASPM) tool comes in.

The Future of Generative AI in Application Security

As generative AI revolutionizes how we write software, it’s also reshaping how we secure it. Tools like GitHub Copilot and ChatGPT now allow developers to write functional applications with just a few prompts. This growing trend, dubbed “vibe coding,” represents a fundamental shift in development philosophy: developers rely on AI-generated code and focus more on ideas than implementation. This unlocks speed and creativity, but it also exposes new and serious security risks.

An Enterprise Security Strategy That Turns SecOps Into Heroes

The tension between security teams and developers is palpable. Developers are considered impatient risk-takers, while SecOps folks are barely tolerated as a hindrance to adopting new tools and workflows. Weekly sprints, tight deadlines, and looming security threats (especially in the GenAI and vibe coding era) exacerbate this tension.

ROI of Application Risk Management: Measuring Impact

Until a decade or so ago, it was sufficient for security teams to use firewalls, antivirus, and intrusion detection to secure their business network. Today’s application environments have expanded beyond traditional perimeters to include APIs, open-source software, third-party modules, and AI-generated code. This greatly increases the attack surface and need for application risk management that’s holistic and automated.