Checkmarx Acquires Custodela to Bring Enhanced Automation to DevSecOps Programs!
Software Exposure is the new unknown. But not for long.
Manage Software Exposure at the Speed of DevOps
Gartner Magic Quadrant for Application Security Testing, 2018
The Complete Guide to Developer Secure Coding Education
CISO of Brussels Airlines answers "Why Checkmarx?"
Checkmarx is pioneering Software Exposure
Vulnerabilidade encontrada no NFC pode nunca vir a ter correção. Investigador fala numa mudança de paradigma para aquela que é uma das tecnologias mais populares no mundo.
Checkmarx formed a strategic partnership with Fishtech Group to enable customers across North America manage software exposure at the speed of DevOps. Working together, Fishtech Group will become a reseller of Checkmarx’s Software Exposure Platform to help customers release secure software.
Researchers have demonstrated that the near-field communication (NFC) protocol can be used to exfiltrate small amounts of data, such as passwords and encryption keys, over relatively long distances.
Government Payment Service Inc., a company that offers a service called GovPayNow used by U.S. state and local governments, exposed 14 million records online.
Discovered by security researcher Brian Krebs and revealed Tuesday, the breach included names, addresses, phone numbers and the last four digits of the payer’s credit card going back six years. It was all exposed by the company failing to secure them, leaving them open for anyone to access.
There once was a time in software development where developers could design, build and then think about their software's security. However in today's highly connected, API-driven application environment, this approach is simply too risky as it exposes the software to vulnerabilities.
There once was a time in software development where developers could design, build and then think about their software’s security. However in today’s highly connected, API-driven application environment, this approach is simply too risky as it exposes the software to vulnerabilities.
DevOps teams are involved with security but they need to do more. Two recent studies show that tooling is inadequate and that security is not properly integrated into the entire DevOps process.
Crypto phishing — sending emails or creating websites that resemble a trusted crypto company — and cryptojacking — using another person’s computer to mine currencies — are two new methods that are increasingly used, Cisco representatives told a attendees Wednesday at the Black Hat conference in Las Vegas.
A large majority of organizations are struggling to implement security into their DevOps processes, despite saying they want to do so, according to a new report.
That’s the biggest takeaway from a new report out today from security firm Checkmarx Ltd. “Managing Software Exposure: Time to Fully Embed Security into Your Application Lifecycle” was undertaken in conjunction with FreeForm Dynamics and The Register based on the input of 183 respondents worldwide in a variety of information technology roles.
Thousands of startups have been formed over the past decade to focus on combating cybercrime. The Cybersecurity 500 features the hottest and most innovative companies in this market.