Resources

Filters

Video

Introduction to ThreadFix tagging part 2

In this video we will talk about how to apply tags to vulnerabilities and vulnerability comments, and how these tags can be used to improve your remediation workflow as well as support compliance initiatives.

  • Compliance
  • ThreadFix

Video

ThreadFix filters tutorial

Filters are a powerful capability in ThreadFix that are used extensively in our reporting, as well as for configuring policies. In this video we will look at how to create filters, and some of the ways they can be used to create customized views for vulnerability analysis and reporting.

  • Application security
  • ThreadFix

Video

ThreadFix policies tutorial

In this video we will talk about the different kinds of policies and how they can be used to support your security efforts. The four different kinds of policies are: Filter policies, Pass Criteria policies, Defect Reporter policies, and Time to Remediate policies.

  • Application security
  • ThreadFix

Video

ThreadFix remote provider tutorial

In this video, we’ll discuss how remote providers can be used to automate and ease the ingestion of vulnerability data into ThreadFix.

  • Application security
  • ThreadFix

Video

ThreadFix roles and permissions tutorial

ThreadFix is the industry leading vulnerability resolution platform that provides a window into the state of application security programs for organizations that build software. Roles and permissions can be managed to restrict and provide access to individuals, teams and role types within ThreadFix.

  • Application security
  • ThreadFix

Video

ThreadFix terminology tutorial

In this video, we’ll provide an introduction to some of the commonly used terms you will come across while working in the ThreadFix platform.

  • Application security
  • ThreadFix

Video

Application security programs

Modern development practices are continuously pushing changes through the pipeline, and point-in-time testing is not sufficient to address today's security concerns. Learn more about application security programs now in this short video.

  • Application security

White Paper

Effective CISO board presentations

For years, CISOs have often struggled with gaining access to their Board of Directors. This white paper outlines the top five principles for navigating discussions at this level to garner support and address business needs.

  • Cyber Risk Advisory