Posts by Arden Rubens:


3 Need-to-Know Security Terms for 2017: DevOps, “Shifting Left” and Ransomware

Feb 15, 2017 By Arden Rubens | As organizations of all sizes and verticals prepare for whatever malicious cyber criminals have in store for them in the upcoming fiscal quarters,  we wanted to focus on three need-to-know terms that all security professionals should be aware of, and familiar with, in 2017.   Today, organizations need to increase the speed and quantity of their releases, thus leading to an industry shift from waterfall to agile software development. Out of this shift in methodology, DevOps was born.

</Read More>

Cyber Threats Facing APAC – Applications

Feb 13, 2017 By Arden Rubens | New and improved fast paced technologies are offering us exciting ways to live, are helping us at work, and continue pushing the boundaries of innovation and efficiency. However, along with all of the good comes the bad – the raised risk and exposure to security threats. In part one and part two of our three part series on cyber threats facing the Asia Pacific (APAC) region, we established that APAC has the worst record in terms of cyber security, with its countries some of the most vulnerable in the world and the discovery of breaches taking over three times longer than the global average.

</Read More>

January 2017: Top Hacks and Breaches [INFOGRAPHIC]

Feb 08, 2017 By Arden Rubens | The new year started with a whole new collection of hacks and security breaches. On the 4th of January, the known hacker CyberZeist claimed to have hacked the FBI’s website and proved it by leaking personal account information of several FBI agents. The hack happened by the exploitation of a zero-day vulnerability in the Plone CMS, according to a report by Hacker News. Since, Plone has denied that there was a zero-day vulnerability, yet released a security update on the 17th of January to “patch various vulnerabilities”.  

</Read More>

8 Chrome Extensions Every Security Pro Needs

Jan 25, 2017 By Arden Rubens | Google Chrome is the most popular web browser, and it comes with a large library of Chrome extensions with the aim of helping you customize your browsing experience. And with so many options, it can be hard to find the extensions which are right for you. Therefore we put together this list featuring the top Chrome extensions every security professional needs.

</Read More>

The Season of Retail Hacks

Jan 15, 2017 By Arden Rubens | Vera Bradley, fashion retail brand, is one of the many recent cybercrime victims. This luggage and handbag design company revealed that earlier this year, payment systems at multiple locations were hacked, and that an unknown number of personal payment cards used by customers may have been compromised.   With this hack, Vera Bradley joined the large group of retail companies targeted and then successfully attacked by hackers. The group of victim companies includes many heavy hitters such as Target, Home Depot, and Neiman Marcus.

</Read More>
Cyber Attacks 2016

2016: The Year in Cyber Attacks [INFOGRAPHIC]

Dec 29, 2016 By Arden Rubens | 2016 has been littered with hacks, breaches and big discoveries of major vulnerabilities. From hundreds of millions in leaked stolen data to the hacks which influenced the US Presidential Election, this year has been very, very busy in terms of cyber attacks. 

</Read More>
Cyber Threats Facing APAC

Cyber Threats Facing APAC – Government

Dec 27, 2016 By Arden Rubens |  
According to report by Deloitte, Singapore, Australia, Japan, New Zealand, and South Korea are the top five countries vulnerable to cyber attacks in APAC, with the stats showing them as nine times more vulnerable to cyber attacks relative to China and India. However, with the amplifying amount of cyber-attacks and a growing cyber-war in the region, organizations (primarily governmental) are waking up to the fact that they need a strong defence and means of protection against cyber security attacks.
Though, as the cyber security world is constantly evolving, many major government sites and databases are failing to keep up with the latest security trends and do not apply the proper protection to their assets; proving that, when breached, the damage can be colossal.

</Read More>
Tips to Secure SDLC

Quick Tips To Secure Your SDLC

Dec 22, 2016 By Arden Rubens | Applications have become as complex as ever, and with the constant evolution and advancement of applications, cyber threats have become of the biggest risks that organizations today face – and as most of the past cyber attacks on organizations teach us, those risks can be absolutely disastrous. Therefore, along with the increased business risks and concerns correlating with insecure software, the attention from organizations is significantly more focused on building securely.

</Read More>
cyber threats facing apac part 1

Cyber Threats Facing APAC – Finance

Dec 15, 2016 By Arden Rubens | Technology is undoubtibly a major part of the modern day world; with such widespread use and with more private information and data exchanged, the risks of cyber attacks increases – as does the damage levels which come as a result. As many different corners of the world are under constant threat by hackers worldwide, let’s take a closer look at one of the most dynamic technological landscapes – APAC (Asia Pacific) – and its’ areas under constant cyber threat.
Asia Pacific is quickly gaining on the rest of the world as a leader in information technology. According to Gartner, Singapore, Malaysia, Indonesia and Thailand are among the countries to invest the most in IT, in addition to quickly adopting technologies such as IT outsourcing, the hybrid cloud, and the Internet of Things, therefore putting the region as whole on the IT map. But with the huge increase in technology and internet usage, comes new and prominent cyber threats.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.