In The News

OWASP Top 10 & Open Source Code: Why Watching Your Back Means Watching Everyone Else’s
June 6, 2016 | By Admin

At times, being a developer can feel a little bit like being back in school and getting partnered up on projects. You would work your butt off, fastidiously checking and... Read More >

Don’t wait for the police: plugging holes in your website forms to avoid SQL injection
June 6, 2016 | By Naomi Webb

It’s been a while since the last major Florida election controversy but at long last the sunshine state has delivered. A cybersecurity researcher exposed serious vulnerabilities in the Lee County... Read More >

5 Ways to Create a Secure Software Development Life Cycle (sSDLC)
June 5, 2016 | By Kamn

Enterprise level software needs a tightly bound software development life cycle (SDLC) to ensure deployed applications follow business requirements and stay bug-free. In the Hollywood blockbuster version of this high-stakes... Read More >

Easy and Cost-Effective Secure App Development
June 4, 2016 | By Diogo Costa

Every year, we see a considerable increase in the number and severity of cybersecurity incidents from which companies suffer major financial losses, harm to their reputation, and irreparable damage to their customers. In 2015 alone, cybercriminals raked in billions of dollars from data breaches, as well as account information for... Read More >

Hacking: The Case for Prevention Rather Than Cure
June 2, 2016 | By Amit Ashbel

When the movie Sneakers came out in 1992, hacking wasn't considered a real threat; it was almost something cool that really clever kids did just to prove they could.  More than two decades later, hacking has taken on a far more sinister tone and become a much more profitable profession.... Read More >

The OSI model, your security, and giving special consideration to the application layer
June 2, 2016 | By Patrick Vernon

There’s a certain poignant disappointment that occurs when your expectations do not align with reality. Especially when your expectations are both reasonable and logical. Take the topic of securing an... Read More >

Press Releases

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.