Application Security Trends

Traditional security is well past its expiration date. Learn about the latest trends in AppSec in these posts, from DevOps to SAST and everything in between.
blog-history-of-javascript

The History of JavaScript [INFOGRAPHIC]

Feb 12, 2018 By Arden Rubens | JavaScript was created by Brendan Eich, a Netscape Communications Corporation programmer, in September 1995. It took Eich only 10 days to develop the scripting language which was then known as Mocha.  

Read More »
blog-january-2018_-hacks-and-breaches

January 2018: Hacks and Breaches

Feb 01, 2018 By Arden Rubens | It’s been released that hackers stole £130bn from consumers in 2017, and that number is only predicted to rise in 2018. Hackers wasted no time and were off to a quick start in the new year, especially following their success in 2017. Let’s recap what hackers have been up to in January.

Read More »
blog-tinder

Are You on Tinder? Someone May Be Watching You Swipe

Jan 23, 2018 By Dafna Zahger | The Checkmarx Security Research Team found disturbing vulnerabilities in a highly popular dating application used by people across the globe – Tinder. The report features how a malicious attacker can take advantage of these vulnerabilities to cause serious privacy breaches to an unsuspecting user.

Read More »
blog-year-of-gdpr

The Year of GDPR

Jan 15, 2018 By Arden Rubens | Way back in 2012, the European Commission laid down initial plans for the European Union’s data protection reform. It took the relevant parties four years to reach an agreement on what would be involved and how it will be enforced. And now, here we are! As close as ever to the May deadline in the year Europe finally takes the leap to be “fit for the digital world”, and business will be changing the way which data is handled, processed, and protected with the General Data Protection Regulation (GDPR).  

Read More »
blog-owasp-resources

Top 5 OWASP Resources No Developer Should Be Without

Jan 09, 2018 By Sarah Vonnegut | Writing secure code is now a must for developers. The rising number of attacks on organizations big and small and the fallout for companies who’ve been breached are growing. As such, security is finally moving out of the periphery to become a mainstay for business continuity.  

Read More »
blog-recap_-the-biggest-data-breaches-of-2017

Recap: The Biggest Data Breaches of 2017

Dec 31, 2017 By Arden Rubens | From a Republican National Committee contractor exposing voting data on nearly 200 million people to Equifax revealing a breach impacting over 143 million people – it’s safe to say that when it comes to data breaches, 2017 has kept us on our toes. So much so that more data was lost or stolen in the first half of 2017 (1.9 billion records) than in the entire of 2016 (1.37 billion) according to research released earlier this year.  

Read More »
blog-2018-predictions-looking-ahead_-whats-in-store-for-2018_

Looking Ahead: What’s in Store for Cybersecurity in 2018?

Dec 25, 2017 By Arden Rubens | As the cybersecurity world is left reeling from record breaking hacks and breaches which occurred (or surfaced) in 2017, the importance of organizations ensuring their code’s security is rightfully taking the spotlight as the new year begins.   However, in taking a step beyond code security, it’s critical that organizations of all sizes and those employed within them are paying close attention to the rising trends impacting the cybersecurity world. Continue reading to learn more about our predictions of which cybersecurity trends will dominate in 2018.  

Read More »
blog-smart-cities_-can-my-city-be-hacked_

Smart Cities: Can My City be Hacked?

Dec 11, 2017 By Sarah Vonnegut | Our connected devices make life easier on us as individuals, and the conveniences afforded to us by connecting technology to the physical world around us are compounded when we expand the reach from individuals to a greater population, – entire cities.   While cities have been adapting new technologies that connect the physical world to the digital world for decades, the rate at which they do so is reaching new heights, and the technologies themselves are far more advanced. These technologies, and the greater amount of connectivity they allow for, are opening cities up for the greater good…as well as the greater evil.  

Read More »
blog-a-closer-look_-owasp-top-10-application-security-risks

A Closer Look: OWASP Top 10 2017 – Application Security Risks

Dec 03, 2017 By Arden Rubens | Open Web Application Security Project (OWASP) is an organization filled with security experts from around the world who provide information about applications and the risks posed, in the most direct, neutral, and practical way. Since 2003, OWASP has been releasing the OWASP Top 10 list every three/four years. The list consists of the top biggest Application Security Risks according to OWASP.

Read More »
blog-november-infographic

November 2017: Top Hacks and Breaches [INFOGRAPHIC]

Dec 01, 2017 By Arden Rubens | Recent research confirms that a third of the internet is under attack, with millions of network addresses subjected to DDoS attacks over a two year period (source). And as I write these monthly hacks and breaches reviews, this statement comes as no surprise. Just because it’s officially the holiday season, it doesn’t mean that hackers will be slowing down. Here’s a roundup of some of November’s notable hacks and breaches.  

Read More »

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Get a Checkmarx Free Demo Now

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.

SUBSCRIBE