All Things Checkmarx

In The News

Guest View: Cybersecurity education isn’t a game. Or is it?
February 28, 2017 | By Amit Ashbel

Security, specifically application security, has become a huge challenge for IT companies worldwide. Actually, most companies in any vertical nowadays have some sort of IT platform they maintain. An increasing... Read More >

Checkmarx announces Open Beta for Scala Programming Language Vulnerability Detection
February 16, 2017 | By Dawn Nicholls

New York: Checkmarx has announced open beta support of the Scala programming language. The new capability adds the ability to analyze and remediate security risks and vulnerabilities exposed in projects... Read More >

A Modern Day Love Story: Security and DevOps
February 13, 2017 | By Amit Ashbel

It’s a tale as old as time, the last person you ever thought you would love becomes the one person you can’t live without. Enter – software security and developer teams, did you see that one coming? While these teams may not always see eye to eye, one cannot succeed... Read More >

Executive Viewpoint 2017 Prediction: Checkmarx – Spotting Software Trends and Beyond
February 6, 2017 | By Paul Curran

Software is now embedded in every aspect of modern day business, making it critical for organizations to understand how the industry is evolving and where it’s headed. The internet, with... Read More >

January 2017: The month in hacks and breaches
February 6, 2017 | By CSO Staff

Then, on January 19th, internet account passwords for 14 Trump appointees, including Rudy Giuliani and Michael Flynn, were leaked online, the result of “mass breaches of websites like LinkedIn, MySpace, and others between 2012 and 2016,” according to a report by Britain’s Channel 4. But that wasn't all the news... Read More >

J is for Java Script
February 6, 2017 | By Network Computing

J is for JavaScript. JavaScript is a core component of and present in almost every element of the web browsing experience. Because of the prolific nature of JavaScript on the web, any JavaScript vulnerabilities that are identified are valuable to cybercriminals and can be exploited to attack websites, individuals and... Read More >

Press Releases