It’s December, and thus the perfect time to reflect on the events of the past twelve months. In InfoSec, there’s a lot to contemplate, having been one of the worst years in terms of data breaches and security breakdowns. According to the 2015 PwC State of InfoSec Survey, there were an estimated 28.9 million breaches in 2013, and an estimated 42.8 million in 2014: An increase of 48% in just one year. From major retail incidents to open-source vulnerabilities like Heartbleed and Shellshock, hardly a week went by without another InfoSec disaster.
We can do better in 2015. While we can’t change the past, we can change the future. Reflection and analysis is a great way to get the ball rolling, and a bit of fun always helps, too. It’s in that spirit that we’re announcing the InfoSec Fail of the Year Awards at InfoSecFail.com!
We’re inviting the community to nominate what you think the most Epic InfoSec Fail of the past year was and see if others agree with you. From now until January 4th, contribute your nomination at InfoSecFail.com or vote up another fail you think should win.
Instead of awarding prizes to the failures, we’re awarding the posters of the top three InfoSec Fails. The top nominated prize will win an AR Drone, and the second and third will score Amazon gift cards ($100 & $50, respectively). We’ll announce the winners on the site and by email on January 5th.
So now, what security failure deserves a big lump of coal in their stocking? The choice (and the chance to win!) is up to you: Head over to InfoSecFail.com and nominate your most epic InfoSec fail.
Sign up today & never miss an update from the Checkmarx blog
Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.
Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.