Application Security Trends

Traditional security is well past its expiration date. Learn about the latest trends in AppSec in these posts, from DevOps to SAST and everything in between.
Application-Security-News-Thumbnail

What’s HOT In Application Security Vol #14

Jun 04, 2012 By Administrator | Are Chinese Hackers threatening the US economy using malware?
According to a McClatchy-Tribune report this month “Chinese attempts to collect U.S. technological and economic information will continue at a high level and will represent a growing and persistent threat to U.S. economic security.” The FBI, Department of Homeland Security and the Justice Department’s national security division have raised concerns in granting an international service license to China Mobile, making it easier for China to spy on the U.S. or steal intellectual property from U.S. companies.

Read More »

What’s HOT in Application Security Vol#13

May 21, 2012 By Administrator | The High Price of Web Application Security 
What is the true cost of web application security? One CISO might say ‘My entire security solution cost me $40,000’, another might quote a higher price but many companies will simply answer ‘What is the cost of no application security?’

Read More »

What’s HOT in Application Security Vol#12

May 14, 2012 By Administrator | 90% of all Custom Built Web Application are Wide Open for Attacks!
An astounding 86% of custom built websites are said to have vulnerabilities, said a report issued last week by an American IT company. Nearly 90% of all custom designed web applications tested found positive SQL Injection leaks.

Read More »

What’s Hot in Application Security Vol #11

May 09, 2012 By Administrator | Is fear in the Cloud misplaced?
Who’s afraid of the big bad cloud? Everyone apparently! Corporations, Public Companies; the list is endless. Cloud Security is synonymous with problems. When we consider Cloud Security we think about application security and guarding sensitive data. Cloud Security has been one of the things on the front of the minds of IT directors for years as they ponder; how do we migrate data out of the corporate data centers to the cloud?

Read More »

What’s HOT in Application Security Vol#10

Apr 30, 2012 By Administrator | What’s Wrong with the Public Sector?
They’re failing OWASP Top 10!  
OWAP Top 10- the bible of web applicaiton vulnerabilties, the benchmark vulnerabilities by which most organizations should by going by; who’s their worst pupil? The Public Sector.

Read More »

What’s HOT in Application Security Vol #8

Apr 16, 2012 By Administrator | Would you Trade your freedom for Application Security?
OWASP’s Dan Greer recently gave the keynote speech at the “Application Security Matters’ conference where he delved into the problems and issues arising from the inconsistencies in application security. There are many things which contribute to lousy application security- not taking the necessary steps to protect your code, protect your data and poorly written and bloated code. What can one do about it?

Read More »

What’s HOT in Application Security Vol#7

Apr 11, 2012 By Administrator | SQL Injection- the Number One Security Concern
Cybercriminals are using SQL injection to attack both websites and internal databases. Why are they doing this? The answer is simple- to seek sensitive data which could be used for black market activities or even identity theft. Most public websites don’t even fully understand how totally ‘at risk’ their websites are.

Read More »

What’s HOT in Application Security Vol#6

Mar 26, 2012 By Administrator | Application Security- Not Sufficient!
A study was recently conducted among 800 It executives which found that there is a huge difference between the perception of Security from the viewpoint of the developer and security professionals. Security professionals view the applications in a far more optimistic light- stating that they are secure enough, whilst developers say that their applications run in their enterprise are no way near secure enough.

Read More »

What’s HOT in Application Security Vol #4

Mar 11, 2012 By Administrator | Where is NASA’s security?
5,408 successful eruptions since 2009, 48 stolen laptops and mobile devices,47 advanced persistent threats (APTs) and 13 that managed to jeopardize thousands of NASA’s computers causing serious damage and leaving NASA with an approximated $7 million bill. http://www.space.com/14750-stolen-nasa-laptop.html

Read More »

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Get a Checkmarx Free Demo Now

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.

SUBSCRIBE