Webinar Recording: The Business Value of Partial Code Scanning

We are pleased to present you with the recording of the latest webinar that was held on the 22nd of March. The webinar was presented by: Kevin Beaver of Principle Logic (http://www.principlelogic.com/) Maty Siman – Foudner & CTO of Checkmarx (https://www.checkmarx.com)

Read More »

Top 5 Cyber Threats to Businesses

According to FBI Director Robert Mueller, cyber-crime is on track to surpass terrorism as the most serious security threat in the United States. Businesses in particular face an increasing risk of exposing themselves to cyber-attacks. Here is a list of the top five cyber threats that threaten businesses today.

Read More »

What’s HOT in Application Security Vol#6

Application Security- Not Sufficient! A study was recently conducted among 800 It executives which found that there is a huge difference between the perception of Security from the viewpoint of the developer and security professionals. Security professionals view the applications in a far more optimistic light- stating that they are secure enough, whilst developers say

Read More »

Security Digest March 15 – March 18 – 3 vulnerabilities

What a busy week it was. Endless critical vulnerabilities were found in major platforms. I decided to focus on three of them 1) (CRITICAL) RDP Remote code execution – you server allows incoming RDP (Terminal Server)? The most probably people can gain admin access without having a valid name and password:

Read More »

What’s HOT in Application Security Vol #4

Where is NASA’s security? 5,408 successful eruptions since 2009, 48 stolen laptops and mobile devices,47 advanced persistent threats (APTs) and 13 that managed to jeopardize thousands of NASA’s computers causing serious damage and leaving NASA with an approximated $7 million bill. http://www.space.com/14750-stolen-nasa-laptop.html

Read More »

What’s HOT in Application Security Vol #3

Let’s understand the web application security dilemma! Organizations within the financial services industry track an average of 800 attacks, organizations out with the financial services industry track an average of 500 attacks- no wonder it’s so vital to understand application security. It’s said that the security challenge is due to the fact that most of

Read More »

Source Vs. Binary Static Code Analysis

Secure software development has become a priority for all organizations whether they build their own software or outsource.Code analysis is becoming the de facto choice to introduce secure development as well as measure inherent software risk.Many assume that code analysis requires code compilation as a prerequisite. Today, all major static code analyzers are built on

Read More »