Live Webinar February 27 | Better Together: SAST and IAST
Software Exposure is the new unknown. But not for long.
Manage Software Exposure at the Speed of DevOps
Gartner Magic Quadrant for Application Security Testing, 2018
The Complete Guide to Developer Secure Coding Education
CISO of Brussels Airlines answers "Why Checkmarx?"
Checkmarx is pioneering Software Exposure
Java has come a long way since it was introduced in mid-1995. Its cross-platform characteristics have made it the benchmark when it comes to client-side web programming. But with cybercrime and hackings reaching epidemic levels due to its widespread usage and distribution, the need for secure Java development has become... Read More >
Some Starbucks customers have had money siphoned out of their Starbucks mobile app by thieves using a clever new attack, but Starbucks itself hasn't been hacked, the company said Friday. It works like this: First, the thieves buy stolen passwords and IDs on the underground market. They then use an... Read More >
In its third year of coordinating cyber attacks against Israel, the online “hacktivist” group Anonymous decided to up its rhetoric. On April 7, the group promised in a video, it would unleash “an electronic Holocaust” on the Jewish state, threatening to wipe Israel from the cyber- security map. Though Anonymous garnered plenty of media attention, the question is whether it... Read More >
Brilliance Security Magazine had the good fortune of sitting down with Maty Siman, Founder and CTO, of Checkmarx at the RSA Conference in San Francisco. Mr. Siman’s obvious intelligence yet humble demeanor enables him to standout as a notable leader in the security industry. Founded in 2006 and headquartered in Tel Aviv, Checkmarx develops... Read More >
The new partnership between Virtual Forge and Checkmarx offers companies a powerful platform for testing and ensuring the application security of business applications, including those that are developed in SAP... Read More >
As demand to access company information on the move and from mobile devices increases it places extra strain on security resources. Existing web applications firewalls (WAFs) monitor traffic but don’t have an understanding of the logic of data flows and the behavior of applications. This can make it hard for... Read More >