Posts by Sharon Solomon:

Webinar1-97x300

Checkmarx and Security Innovation present: Faster & Better Remediation [Webinar]

Nov 25, 2013 By Sharon Solomon | FASTER & BETTER REMEDIATION [Webinar]: WITH SECURITY INNOVATION’S TEAMMENTOR AND CHECKMARX’S CXSUITE. Click HERE to register.  Software security requires that software teams create secure code and validate that the resulting executables are not vulnerable. Static security analysis tools allow development teams to locate and mitigate security issues during the development process. In the meanwhile, security guidance reduces the number of security scan cycles that involve QA, Information Security or other teams.

</Read More>
Obamacare-300x300

Obamacare Website Compromised; Security Issues Surface

Nov 21, 2013 By Sharon Solomon | The Obamacare website has now joined the ever-growing list of compromised portals. Reports of bad user-experience and rumors of security breaches have been making the rounds for weeks, but the newly launched national healthcare website (healthcare.gov) has now apparently fallen prey to a typical Cross-Site Scripting attack. 

</Read More>
iStock_000011717477XSmall1-300x260

5 Ways To Protect Your Work Cyberspace

Nov 18, 2013 By Sharon Solomon | With hackers compromising virtually every software platform that exists, it’s time for all of us to step up our cyber security awareness. Security issues are crucial especially at work establishments, where sensitive information and data are susceptible to attack.

</Read More>

Monetary Authority of Singapore (MAS) Embraces SAST

Nov 15, 2013 By Sharon Solomon | Application security in Financial Information Systems (FIS) has become a must in today’s malicious cyberspace. Due to the wide range of solutions in the market, many software executives find it hard to pick the right defense strategy for their systems, which contain highly sensitive details and valuable information.

</Read More>
439px-Microsoft_logo.svg_-300x300

Microsoft releases Security Advisory, Windows Users at Risk

Nov 08, 2013 By Sharon Solomon | In a sudden turn of events, Microsoft has released a Security Advisory regarding vulnerability in some of its most common software versions. This security flaw can allow hackers to execute codes remotely by gaining full access to user’s computers.

</Read More>
Adobe_Systems_logo_and_wordmark.svg_

Adobe Website Hacked, Millions of Passwords Stolen

Nov 06, 2013 By Sharon Solomon | Web hacking was considered an ostracized field just a few years ago. These days it’s a subculture, with more and more average programmers learning the basics of the trade and pulling off impressive “conquests”.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.