In the News

Greatest Hits Of 2016: Readers’ Picks For The Years’ Best Commentary

27 Dec 2016 | By Marilyn Cohodas

The hacking thriller Mr. Robot may have been snubbed by the 2017 Golden Globe Award nominating committee this month, but security researcher Sarah Vonnegut’s blog -  5 'Mr. Robot' Hacks That Could Happen in Real Life - about the award-winning season one, pulled in the highest numbers of readers of all the contributed content we published in 2016.

Vonnegut, an application security community specialist at Checkmarx, offered a reality check to anti-hero Elliot’s premier season hacking prowess, and garnered a whopping 14,738  page views from Dark Reading fans of the show.

 

The full article is available on Dark Reading.

The hacking thriller Mr. Robot may have been snubbed by the 2017 Golden Globe Award nominating committee this month, but security researcher Sarah Vonnegut’s blog –  5 ‘Mr. Robot’ Hacks That Could Happen in Real Life – about the award-winning season one, pulled in the highest numbers of readers of all the contributed content we published in 2016.

Vonnegut, an application security community specialist at Checkmarx, offered a reality check to anti-hero Elliot’s premier season hacking prowess, and garnered a whopping 14,738  page views from Dark Reading fans of the show.

 

The full article is available on Dark Reading.


</close>

Should CIOs Be Certified to Practice Data?

19 Dec 2016 | By Gary Beach

Asaph Schulman, vice president, marketing, for Checkmarx, an application security firm, says “the threat landscape is constantly evolving and in an era where every department of every company seems to be developing software, it is difficult to manage what one doesn’t understand.”

 

The full article is available on The Wall Street Journal

Asaph Schulman, vice president, marketing, for Checkmarx, an application security firm, says “the threat landscape is constantly evolving and in an era where every department of every company seems to be developing software, it is difficult to manage what one doesn’t understand.”

 

The full article is available on The Wall Street Journal


</close>

The role of testing in securing applications

19 Dec 2016 | By Amit Ashbel

Adopting a DevOps culture is becoming increasingly discussed with a HP Enterprise report recently claiming that 99 per cent of operations professionals agreeing that it can improve application security but unfortunately the report also highlighted that only 20 per cent of respondents test during the development process. But testing is arguably the most important part of Application Security (AppSec) yet how organisations test various significantly from company to company.

So how can we understand what's happening in the marketplace and what we need to do to create more secure applications? In this article, we look at the findings of the SANS State of Application Security report we recently commissioned and discuss the importance of moving testing to a Secure Software Development Life Cycle.

 

Continue reading here

Adopting a DevOps culture is becoming increasingly discussed with a HP Enterprise report recently claiming that 99 per cent of operations professionals agreeing that it can improve application security but unfortunately the report also highlighted that only 20 per cent of respondents test during the development process. But testing is arguably the most important part of Application Security (AppSec) yet how organisations test various significantly from company to company.

So how can we understand what’s happening in the marketplace and what we need to do to create more secure applications? In this article, we look at the findings of the SANS State of Application Security report we recently commissioned and discuss the importance of moving testing to a Secure Software Development Life Cycle.

 

Continue reading here


</close>

Ashley Madison forced to pay for deceptive security practices

15 Dec 2016 | By Max Metzger

Amit Ashbel, cyber-security evangelist at Checkmarx told SC Media UK, “on a day that Yahoo admits that one billion account credentials have been stolen. The fine that Ashley Madison got seems like peanuts.”

“I think it's important to enforce cyber-security in one way or another. A fine seems like the most obvious option, just like any business is fined for not fulfilling regulations or laws. That said, a tech organisation should always have their user's data security as top priority and make sure they take all necessary actions to avoid such events in the future.”

 

The full article is available on SC Magazine.

Amit Ashbel, cyber-security evangelist at Checkmarx told SC Media UK, “on a day that Yahoo admits that one billion account credentials have been stolen. The fine that Ashley Madison got seems like peanuts.”

“I think it’s important to enforce cyber-security in one way or another. A fine seems like the most obvious option, just like any business is fined for not fulfilling regulations or laws. That said, a tech organisation should always have their user’s data security as top priority and make sure they take all necessary actions to avoid such events in the future.”

 

The full article is available on SC Magazine.


</close>

Checkmarx 2017 Predictions: Predicting a Soft Future

15 Dec 2016 | By Paul Curran

Society, having moved from an industrial age to the birth of the internet is now truly an era where software has become the most critical aspect of our modern world. In earlier times, manufactured products left the factory with just a single purpose, now, through updates via the internet, products evolve or play host to the 4.5 million apps available on platforms from Google, Apple and Microsoft.  From national infrastructure to banking and even the cars we drive, software is vital for our health, safety and wellbeing.

 

Continue reading on VMblog.

Society, having moved from an industrial age to the birth of the internet is now truly an era where software has become the most critical aspect of our modern world. In earlier times, manufactured products left the factory with just a single purpose, now, through updates via the internet, products evolve or play host to the 4.5 million apps available on platforms from Google, Apple and Microsoft.  From national infrastructure to banking and even the cars we drive, software is vital for our health, safety and wellbeing.

 

Continue reading on VMblog.


</close>

2017 DevOps Predictions – Part 2

13 Dec 2016 | By DevOps Digest

In my opinion the biggest trend in software development for 2017 will be the continued shift to agile based software development methodologies. Our current social media driven society is pushing organization to release new feature filled web and mobile applications at a lighting pace. Traditional Waterfall software development methodologies are too slow to support the "always on" requirements of today's consumers and businesses. If an organization does not provide the latest and greatest web or mobile application people will simply look elsewhere.
Matt Rose
Global Director Application Security Strateg, Checkmarx

 

Read the full article here

In my opinion the biggest trend in software development for 2017 will be the continued shift to agile based software development methodologies. Our current social media driven society is pushing organization to release new feature filled web and mobile applications at a lighting pace. Traditional Waterfall software development methodologies are too slow to support the “always on” requirements of today’s consumers and businesses. If an organization does not provide the latest and greatest web or mobile application people will simply look elsewhere.
Matt Rose
Global Director Application Security Strateg, Checkmarx

 

Read the full article here


</close>

Predicting a Soft Future

8 Dec 2016 | By Paul Curran

Paul Curran, Content Specialist, Checkmarx looks at several major trends to provide insight on what the software security world will look like in 2020.

Society, having moved from an industrial age to the birth of the internet is now truly an era where software has become the most critical aspect of our modern world. In earlier times, manufactured products left the factory with just a single purpose, now, through updates via the internet, products evolve or play host to the 4.5 million apps available on platforms from Google, Apple and Microsoft. From national infrastructure to banking and even the cars we drive, software is vital for our health, safety and wellbeing.

 

Continue reading this article here

Paul Curran, Content Specialist, Checkmarx looks at several major trends to provide insight on what the software security world will look like in 2020.

Society, having moved from an industrial age to the birth of the internet is now truly an era where software has become the most critical aspect of our modern world. In earlier times, manufactured products left the factory with just a single purpose, now, through updates via the internet, products evolve or play host to the 4.5 million apps available on platforms from Google, Apple and Microsoft. From national infrastructure to banking and even the cars we drive, software is vital for our health, safety and wellbeing.

 

Continue reading this article here


</close>

November 2016: The month in hacks and breaches

7 Dec 2016 | By CSO staff

For a timeline of other notable hacks and breaches from last month, see the following infographic from application security provider Checkmarx.

 

Click here to view the full article and infographic. 

For a timeline of other notable hacks and breaches from last month, see the following infographic from application security provider Checkmarx.

 

Click here to view the full article and infographic. 


</close>

Report: Mirai ‘is just the tip of the iceberg’

7 Dec 2016 | By Max Metzger

Amit Ashbel, cyber-security evangelist at Checkmarx told SC that Mirai throws threw the security of the IoT into sharp relief: “Security experts have brought up the concern of IoT vendors neglecting security more than once over the past years and Mirai has proved their concerns to be legitimate. Devices that have access to the internet and have remote access should be designed with security in mind and this starts with the most basic requirement, namely strict password enforcement.”

He added, “Without the easy access into these devices Mirai would not have been so powerful."

 

Read the full report here

Amit Ashbel, cyber-security evangelist at Checkmarx told SC that Mirai throws threw the security of the IoT into sharp relief: “Security experts have brought up the concern of IoT vendors neglecting security more than once over the past years and Mirai has proved their concerns to be legitimate. Devices that have access to the internet and have remote access should be designed with security in mind and this starts with the most basic requirement, namely strict password enforcement.”

He added, “Without the easy access into these devices Mirai would not have been so powerful.”

 

Read the full report here


</close>

Paul Curran, Content Specialist for Checkmarx, looks at the major security trends which will affect the software security moving forward

6 Dec 2016 | By SecurityBuyer

Society, having moved from an industrial age to the birth of the internet is now truly an era where software has become the most critical aspect of our modern world. In earlier times, manufactured products left the factory with just a single purpose, now, through updates via the internet, products evolve or play host to the 4.5 million apps available on platforms from Google, Apple and Microsoft. From national infrastructure to banking and even the cars we drive, software is vital for our health, safety and wellbeing.

Read the full article on SecurityBuyer

Society, having moved from an industrial age to the birth of the internet is now truly an era where software has become the most critical aspect of our modern world. In earlier times, manufactured products left the factory with just a single purpose, now, through updates via the internet, products evolve or play host to the 4.5 million apps available on platforms from Google, Apple and Microsoft. From national infrastructure to banking and even the cars we drive, software is vital for our health, safety and wellbeing.

Read the full article on SecurityBuyer


</close>
REQUEST A DEMO

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.