Checkmarx Named a Leader in Gartner Magic Quadrant for Application Security Testing

Checkmarx Blog

Why Software Security and DevOps Were the Talk of the Town at Black Hat and DEF CON 2019

In the wake of Black Hat 2019 and DEF CON 27, there is no doubt that the cybersecurity industry is growing beyond anyone’s expectations. The sheer number of sponsors and attendees who descended upon Las Vegas last week from all parts of the world ranged in the tens of thousands, with this number continuing to

Read More ›

Training Exposure: Addressing Secure Coding Education in Your Software Security Program

According to the Verizon 2019 Data Breach Investigation Report, 69 percent of the data breaches investigated by Verizon were perpetrated by outsiders, 63 percent were the result of attackers targeting server assets, and nearly 70 percent of breach incidents were caused by attackers targeting vulnerable web applications. Undoubtedly, there is a substantial connection between vulnerable

Read More ›

LeapFrog LeapPad Ultimate Security Vulnerabilities

Protecting our children from the dangers on the internet is something all parents strive for and struggle with. When you find a toy that you think is safe, and will educate and entertain your child, you buy it. Right? That’s why parents bought and continue to buy LeapFrog’s LeapPad Ultimate. The Checkmarx Security Research Team

Read More ›

Adoption Exposure: Your Software Security Needs Integration and Automation

There are many software security solutions available today designed to provide insight into important security issues found during software development. As organizations begin moving forward with DevOps initiatives, are their current Application Security Testing (AST) solutions doing the work they need them to accomplish? If you haven’t integrated AST automatically into your vulnerability detection, triage,

Read More ›

One Common Theme – One Common Goal

On the heels of the RSA Asia Pacific and Japan conference that took place last week, there was one common theme that Checkmarx captured while speaking with visitors at their stand—imbedding security throughout an organizations’ DevOps ecosystem is viewed as a difficult barrier to overcome. Visitors to our booth who work in the field of

Read More ›

Houston [I mean Bulgaria], we’ve got a problem

Every relationship is built on trust. Trust is at the core of every lasting relationship, whether it’s between family members, between spouses, between organizations and their customers, and even between citizens and their government. At the start of this week, this trust was unfortunately violated in Bulgaria. The data of 5M people was leaked from

Read More ›

Code Exposure: The Vulnerabilities in Your Code & Where They Originate

Code Exposure: The Vulnerabilities in Your Code & Where They Originate Typical software applications are comprised of two types of code: custom code created by your internal development teams, and third-party code – often open source – created outside the organization. Until about 10 to 15 years ago, almost all software was custom code, and

Read More ›

Talking Cloud Technology is Yesterday’s News

Talking Cloud Technology is Yesterday’s News The other day I was on the phone with a colleague, discussing market trends of cloud computing. With me in the room was my 55-year old uncle, who heard bits of our conversation. After the call, he asked me why we spent so much time talking about clouds when

Read More ›

Checkmarx Named a June 2019 Gartner Peer Insights Customers’ Choice for Application Security Testing

Customer feedback is critically important in delivering security solutions that address modern business challenges while enabling key digital-transformation initiatives. It also provides the real-world insights other organizations need when making important purchasing decisions. At Checkmarx, we value customer feedback and rely on it heavily to shape our products and services. That’s why we’re thrilled to

Read More ›

A New EU Cybersecurity Regulation and Why It’s Important

On the heels of GDPR and what it meant to the rest of the world outside of the EU, another EU cybersecurity regulation is on the horizon. Most organizations remember the effort taken to meet GDPR compliance irrespective of where they were headquartered or operated their business. The new EU Regulation called the Cybersecurity Act

Read More ›

Jump to Category