We are glad to summarize a great month of events ! Starting in Infosec Israel, continuing to the Paris- Forum “Matchmaking in the Cloud” and concluding our monthly activities at AusCERT, Australia, we’d love to share our insights.
More than 15,000 South African citizens fell victim to the hacking attack of the SAPS (South African Police Service) website, where all personal information of those who reported crimes were stored. Citizen’s personal and confidential details were exposed on the net, usernames and passwords of the local Police Services personnel leaked and not least… it’s
OWASP publishes a list of new WebGoat movies to teach web application security concepts. WebGoat is an application that enables developers to practice secure programming by demonstrating vulnerability examples and ways to fix them.
We are proud to announce the launch of this important and strategic partnership between Checkmarx and the Deutsche Telekom’s Developer Garden. Press Release: Checkmarx – Tue, May 14, 2013 TEL-AVIV, Israel, May 14, 2013 /PRNewswire/ – The leader in Application Security Testing solutions, Checkmarx Ltd. is today announcing a partnership with Developer Garden, the Deutsche Telekom
The leader in Application Security Testing solutions, Checkmarx Ltd. is today announcing a partnership with Developer Garden, the Deutsche Telekom AG (DAX; DTE) ecosystem for developers. “We are proud to announce the launch of this important and strategic partnership between Checkmarx and the Deutsche Telekom’s Developer Garden. The partnership provides developers with access to Checkmarx
The biggest bank robbery in history- no guns, no masks and no threats. A gang of Cyber Criminals managed to hack into prepaid credit databases (ATM) and steal $45 million. This might be registered as the biggest bank robbery in history. US Bank Muscat has been a victim of this cyber attack with a total loss
Ideal application development involves fast builds and effective testing cycles. This is easily facilitated through the employment of agile development methods. However, if you use this development approach there is a potential pitfall – cycles/sprints are extremely short in duration (often 2-4 weeks) and this makes it very hard for developers to commit to security assurance. There