Checkmarx Launches Infrastructure as Code Scanning Solution to Secure Cloud-Native Applications: KICS

Checkmarx Blog

Five Security Best Practices Public Sector Organisations Need to Consider

Public sector organisations face considerable pressures when developing software to underpin essential citizen services. Delivery timeframes are short, budgets are tight, skills are scarce, and security is paramount. Many public sector organisations often employ experienced contractors to offset the shortage of in-house skills, but this can bring its own challenges when it comes to ensuring

Read More ›

Securing the Online Storefront: Digital Transformation for Growing eCommerce Businesses

Fenny Kuo, software and cyber security specialist at Galaxy Software Services (GSS) shares her insight into what is happening in Taiwan and further afield in the area of eCommerce, crime and rapid digital transformation. Among the many global impacts of COVID-19 one very noticeable effect was on the way we buy on the Street –

Read More ›

Exploitable Path – Advanced Topics

This is the third and final blog on Exploitable Path – a unique feature that allows our customers to prioritize vulnerabilities in open-source libraries. In the first blog, we introduced the concept of Exploitable Path and its importance. The conclusion was that a vulnerability in a library is considered exploitable when: The vulnerable method in

Read More ›

The New Code Analysis Approach in the Modern DevSecOps Era

Over the past couple of years, DevSecOps has become one of the newest catchphrases in organizations who are striving to enhance their secure software initiatives. But what exactly is DevSecOps, and how do you turn it into reality? Unfortunately, just adding a few letters to DevOps does not necessarily lead to nirvana. In most software

Read More ›

How the Air Force and SSA Navigate the (Sometimes Bumpy) Flight to DevSecOps

Rapid software development allows government agencies and military organizations to keep pace with innovation while effectively accomplishing their missions and delivering services to constituents. In order to stay ahead of adversaries and remain secure amidst an increasingly-sophisticated cyber threat landscape, agencies need to deploy application software updates at record speed by streamlining application security solutions

Read More ›

Jump to Category