Checkmarx Named a Leader in Gartner Magic Quadrant for Application Security Testing

All Things Checkmarx

In The News

Easy and Cost-Effective Secure App Development
June 4, 2016 | By Diogo Costa

Every year, we see a considerable increase in the number and severity of cybersecurity incidents from which companies suffer major financial losses, harm to their reputation, and irreparable damage to their customers. In 2015 alone, cybercriminals raked in billions of dollars from data breaches, as well as account information for... Read More >

Hacking: The Case for Prevention Rather Than Cure
June 2, 2016 | By Amit Ashbel

When the movie Sneakers came out in 1992, hacking wasn't considered a real threat; it was almost something cool that really clever kids did just to prove they could.  More than two decades later, hacking has taken on a far more sinister tone and become a much more profitable profession.... Read More >

The OSI model, your security, and giving special consideration to the application layer
June 2, 2016 | By Patrick Vernon

There’s a certain poignant disappointment that occurs when your expectations do not align with reality. Especially when your expectations are both reasonable and logical. Take the topic of securing an... Read More >

How to Integrate Application Security Testing Into the Agile Development Process
June 2, 2016 | By Daan Pepijn

Testing and rooting out bugs are integral parts of any successful application development process. Most prominent software development standards, including the popular Agile method, include provisions for making sure the end-product... Read More >

The Internet of Things will only ever be as secure as its application
June 1, 2016 | By Amit Ashbel

The pace at which the Internet of Things (IoT) is entering our homes and workplaces is phenomenal. This proliferation brings lots of potential benefits to users but it also presents... Read More >

Why websites are so vulnerable to hackers
May 31, 2016 | By Ben Dickson

Hackers just can’t get enough of hacking websites. Malicious actors break into them to upload infected copies of operating systems or distribute malware. Fraudsters use website vulnerabilities to steal sensitive credentials and financial info. The feds take them over to track down child porn consumers. Hacktivists take them down to... Read More >

Press Releases