News | Checkmarx Application Security

Checkmarx.com

News

Your one stop for the latest application security articles, stories, and trends. Stay on top of the news and know what’s happening, both at Checkmarx and in the industry at large.

News

Popular Kids’ Tablet Patched After Flaws Left Personal Data Vulnerable
August 7, 2019

Researchers found security holes that gave away personal data and credit card information of children's parents. Read More

The Israeli Checkmarx Has Revealed a Serious Security Breach on Children’s Tablet
August 7, 2019

Israel-based cybersecurity firm Checkmarx identifies multiple vulnerabilities within children’s’ educational tablet. Read More

A Security-First Approach to DevOps
July 29, 2019

Aware of the risks inherent in software, businesses are recognizing the need for application security. Read More

What’s Driving DevSecOps Adoption Within the Federal Government?
June 25, 2019

We are now seeing a commitment to the adoption of secure coding practices within federal agencies and organizations. Read More

These Are the 13 Hottest Companies in Cloud Security Software, According to IT Professionals
June 2, 2019

A list of the top 13 SaaS security companies that industry professionals are watching most-closely. Read More

The 3 deadly sins of insecure programming
April 19, 2019

Over time, experienced security professionals see the same programming mistakes occur over and over again. In application security, these are usually found either in the design of the software or in the way that this design is implemented—in how the code is written. Read More

The price we pay for convenience may be too high
April 17, 2019

Amazon experienced yet another successful holiday season, and the Echo Dot was the top-selling item on its website for the third consecutive year. As Alexa continues to make its way into... Read More

Checkmarx to Secure Software Development at DOE National Laboratory
March 21, 2019

Checkmarx's Software Security Platform will be integrated into software development lifecycle at Pacific Northwest National Laboratory. Read More

Turn DevOps into DevSecOps without sacrificing automation
March 18, 2019

As DevOps matured within organizations, the process became efficient and fast, but security ended up falling to the wayside. In this article, Gary Stevens explains why security is infiltrating DevOps and how the growth of DevSecOps creates a noticeable drop in the rate of data and security breaches. Read More

Android WebView: Are Secure Coding Practices Being Followed?
March 15, 2019

WebViews are very common in Android applications. There are clear WebView security best practices, but are they being implemented? With our previous blog post in mind, Android WebView: Secure Coding Practices, we wanted to understand how security best practices in WebViews are being implemented in the wild. Are the apps with... Read More

16 Hot New Orchestration, Incident Response, And Threat Intelligence Tools At RSA 2019
March 12, 2019

Here's a look at 16 products released around RSA 2019 that help customers and partners better understand the threat landscape and respond quickly and effectively when attacked. Read More

Checkmarx announces enhancements to Software Exposure Platform
March 8, 2019

Checkmarx, the Software Exposure Platform for the enterprise, unveiled major advancements to accelerate adoption of the most comprehensive, unified software security solution on the market. As the application layer increasingly is the source of successful attacks, risks are amplified as organizations move to agile development and DevOps without implementing proper... Read More

RSA Conference 2019: Firms Continue to Fail at IoT Security
March 6, 2019

Low prices and firms racing products to market are two of the biggest factors when it comes to why Internet of Things devices are not getting the type of security... Read More

Checkmarx Enhances Software Exposure Platform
March 6, 2019

Checkmarx unveiled major advancements to accelerate adoption of the most comprehensive, unified software security solution on the market. As the application layer increasingly is the source of successful attacks, risks are amplified as organizations move to agile development and DevOps without implementing proper DevSecOps practices. The latest release of the... Read More

Checkmarx adds more management capabilities to address security at scale
March 6, 2019

Checkmarx has announced several new capabilities at this week’s RSA Conference in San Francisco in the hopes that it will enable security at scale. The latest version of the Checkmarx... Read More

Lenovo Watch X packs various security bugs reveals a researcher
February 16, 2019

Lenovo Watch X, launched last year as an affordable smartwatch for users in China. It was mainly designed to attract budget smartwatch segment users. Despite its low price tag, it... Read More

Lenovo Watch X was riddled with security bugs, researcher says
February 12, 2019

Lenovo’s Watch X was widely panned as “absolutely terrible.” As it turns out, so was its security. The low-end $50 smart watch was one of Lenovo’s cheapest smart watches. Available only for the... Read More

IoT Scale Flaws Enable Denial of Service, Privacy Issues
February 6, 2019

Flaws in this connected smart scale might give the diet-challenged a legitimate reason to be nervous about using this vulnerable IoT device. Here is an internet of things flaw that can... Read More

Security Matters When It Comes to Mergers & Acquisitions
January 9, 2019

Software security issues aren't going away anytime soon, as proven by the recently disclosed colossal breach at Marriott. Sure, we could rehash the typical post-mortem responses such as securing the software development life cycle, shifting left, DevSecOps, or other industry buzzwords associated with today's security concerns. But in regard to... Read More

Security Matters When It Comes to Mergers & Acquisitions
January 9, 2019

Software security issues aren't going away anytime soon, as proven by the recently disclosed colossal breach at Marriott. Sure, we could rehash the typical post-mortem responses such as securing the... Read More

Skip to content