In The News

Your website may be engaged in secret criminal activity
July 16, 2016 | By Ben Dickson

Most of us think of website hacks as illicit activities aimed at siphoning critical information or disrupting the business of website owners. But what happens when your site becomes hacked,... Read More >

The Real Threat Of Cyberterrorism
July 11, 2016 | By Benjamin Stone

Cyberterrorism: just how real is the threat? When confronted with the idea of cyberterrorism, much of the population would shrug. How much would a large scale disruption of computer networks or a malware attack on a government actually affect the average person’s life or livelihood? Is cyberterrorism really an imminent... Read More >

Checkmarx and Tantallon help UK financial services institution secure application transition to public cloud
July 7, 2016 | By Emmanuelle Lamandé

Checkmarx announced that together with its partner Tantallon are working with a major UK financial services group to create a new type of ‘belt and braces’ approach to securing and... Read More >

The rise of IoT and the associated security risks
July 7, 2016 | By Amit Ashbel

The proliferation of IoT devices in the workplace presents a huge security risk and if new research from ForeScout Techologies is anything to go by, organisations are ill-prepared to deal... Read More >

How To Stay Protected In A World Of Non-Stop Malware Threats
July 5, 2016 | By Naomi Webb

Every day, almost one million malware threats are introduced in the ceaseless jungle that is the internet. And yet, software developers, security experts, and IT administrators are expected to stay... Read More >

7 Mobile App Dev Vulnerabilities That Can Cost You an Arm and a Leg
July 4, 2016 | By Darryl K. Taft

Shark Week is upon us and making swimmers think twice before jumping in the ocean. The chances that a shark might attack are slim, but hidden dangers are always lurking... Read More >

Press Releases

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.