Checkmarx Acquires Custodela to Bring Enhanced Automation to DevSecOps Programs!

Application
Security Trends

Traditional security is well past its expiration date.
Learn about the latest trends in AppSec in these posts,
from DevOps to SAST and everything in between.

OSI Model

Application Layer Security Within the OSI Model

With more and more high-profile hackings taking place in recent years, application security has become the call of the hour. But while the awareness is on the rise, not all security officers and developers know what exactly needs to be secured. One aspect that is often overlooked during development is application layer security. The following

Read More ›

Checkmarx

Israeli IT Prodigies Visit Checkmarx HQ

Checkmarx is continuing its tradition of hosting the brightest programming and computing minds from Israel’s leading academic institutions. This year it was a group of young kids who are currently honing their skills at the Tel Aviv University (TAU). They are a part of a special program that will enable them to complete their college

Read More ›

Smart City

Internet of Things (IoT) – Hack My Smart City

The modern metropolitan is becoming more and more computerized. Mega computers are running the show in more ways that can be comprehended – traffic signals, electricity networks, water supply pipes, public transport services and other civil utilities. While the Smart City concept is improving the standards of urban services, how safe really is it for us?

Read More ›

All You Wanted To Know About Online Banking Security

Gone are the days when people frequented their banks to get their errands done. With more and more banking activities being performed online via web and mobile applications, the security risks are rising exponentially. But are banks and financial institutions doing enough to safeguard our privacy and financial assets? What are the risks and what

Read More ›

What You Need To Know – Millions of eBay Users Exposed

Online e-commerce has become the rage. Millions of people worldwide are doing their shopping on the various online platforms. But even enormous e-commerce platforms like eBay are not immune to cybercrime, as security researcher MLT demonstrated recently. The culprit this time was Cross Site Scripting (XSS), a common application layer vulnerability that obviously was not detected/remediated during

Read More ›

Application Security Trends

The Application Security Trends You Can’t Ignore in 2016

Application security is finally beginning to take wind. After years of being pushed to the background in favor of other areas of IT security, recently we’ve seen a major shift in the security landscape where application security is finally getting attention.With 84% of attacks aimed at the application layer – it’s about time, too.  

Read More ›

Agile Software Development

5 Benefits of Automated Security in Agile Software Development

The IT industry is constantly evolving, with more and more organizations ditching the old Sequential Design Process (Waterfall). Agile Software Development (ASD), an iterative methodology based on collaboration between various cross-functional and self-organizing teams, is becoming the go-to tactic for many organizations across the globe. But Agile software development also requires proper security implementation for optimal results.

Read More ›

Most Popular Posts Checkmarx Blog

The 10 Most Popular Posts of 2015

As we say goodbye to 2015 and begin the new year, we’d like to take a moment to reflect on the great year we had on the Checkmarx blog. We’ve covered a huge array of topics, from interviews with ethical hackers to discussions on the importance of integrating security and DevOps, and it’s that variety

Read More ›

Buffer Overflow

Buffer Overflow: The Mother of All Vulnerabilities

The Buffer Overflow vulnerability has been around for almost 3 decades and it’s still going strong. Hackers all around the world continue to name it as their default tactic due to the huge number of susceptible web applications. But what steps are organizations (devs) taking to combat this vulnerability? What role does secure coding play in eliminating this threat? This article

Read More ›

What You Need to Know – Instagram Hacked

What was stolen?   An independent security researcher was able to hack Instagram servers and gain access to basically all of Instagram’s secret material.  Wesley Weinberg, was able to put his hands on everything from Instagram’s source code through credentials to email servers, SSL certificates and personal data of employees and users. As part of

Read More ›

Jump to Category