Rise of the Machines: AI and Security – Free Webinar with Checkmarx’ CTO

Resources & Tools

Navigate the prickly world of Application Security with this
collection of blog posts on the resources and tools you need to
help you secure your applications.

Takeaways from the Verizon 2017 Data Breach Investigation Report

The annual Verizon Data Breach Investigations Report (DBIR) was released earlier this month to much anticipation, hitting a big milestone with its tenth-anniversary edition. And once again, it’s proving to be one of the most referenced data breach reports in the cyberworld and a must-read for industry leaders and security professionals across the globe.  

Read More ›

The Ultimate Cheat Sheet On Threat Modeling

Security has become a major concern in recent years with hacks becoming bigger and risks becoming greater. Today’s software must be built with the ability to combat and cope with various malicious attacks, and yet, many software developers still might miss a crucial step while creating a secure SDLC (software development lifecycle) process. In order

Read More ›

The 13 Most Helpful Pentesting Resources

Penetration testing, more commonly called pentesting, is the practice of finding holes that could be exploited in an application, network or system with the goal of detecting security vulnerabilities that a hacker could use against it. Pentesting is used to detect three things: how the system reacts to an attack, which weak spots exist that

Read More ›

What is Static Code Review?

Static code review, as a phrase, is actually a bit misleading. Static code review refers to two divergent methods of security testing: static code analyis and code review. These methods check code for flaws, security issues and quality concerns that, when combined, help developers ensure that their code is not only free from potential exploits

Read More ›

The Importance of Database Security and Integrity

Databases often hold the backbone of an organization; Its’ transactions, customers, employee info, financial data for both the company and its customers, and much more. are all held in databases, often left to the power of a database administrator with no security training. Database security and integrity are essential aspects of an organization’s security posture.

Read More ›

A Quick Guide to Ethical Hacking + Top Hacking Tools

They say the best defense is a great offense – and with application security, that’s certainly a big factor in staying ahead of the hackers. Organizations keen on keeping malicious hackers out of their systems will use any number of offensive measures as a way to find the kinds of holes attackers could use against

Read More ›

White Box vs. Black Box Testing Tools: How Would You Treat Your Symptoms?

When I feel ill, I take a trip to my doctor.  At first, the doctor will run some tests to see if there is anything visible that can help indicate what treatment should be given. (Disclaimer: the writer of this post is in no way or manner a medical doctor). The Black Box approach The

Read More ›

10 Easy Ways to Increase Your Application Security Knowledge

If you’re new to the world of security, in whatever capacity, gaining a good understanding of AppSec can seem daunting and distant – but don’t fear. Becoming more application security aware doesn’t have to be hard or time-consuming. It can be as easy as taking a few minutes out of every day to advance your

Read More ›

Jump to Category