Checkmarx Blog

securing the online financial sector with source code analysis feature image

Securing the Online Financial Sector with Source Code Analysis

Sep 21, 2016 By Paul Curran | The financial sector is under constant attack by cyber criminals. In fact, banks are attacked four times more than other industries. Large bank hacks and exploits continually made headlines over 2015 and that trend continues as we progress into Q4 of 2016. What are the major cyber threats facing organizations in the financial and banking sectors, what steps can these organizations take in order to secure their code and what role can source code analysis play in securing banking applications against attackers?
Read More »
cms security tips - feature graphic

Is Your Site Secure? CMS Security Tips from a Canadian Forum Hack

Sep 19, 2016 By Paul Curran | In June 2016, news of a massive hack on the Canada-based forum hosting company VerticalScope spread swiftly around various security blogs and tech news websites. In this attack, hackers were able to steal and leak 45 million records from over 1,000 forums and websites that were included in the VerticalScope network. Amongst their biggest websites, were Motorcycle.com, Boat.com, Mothering.com and more. Read on to find out how the attackers were able to gain access to their database and content management system (CMS) and discover how you can keep your CMS secure.
Read More »
APEX CODING LANGUAGE

ABC’s of Salesforce’s Apex Coding Language [Infographic]

Sep 14, 2016 By Paul Curran | With Salesforce’s giant annual conference, Dreamforce, fast approaching in early October, now’s the time to brush up on their proprietary programming language, Apex. As a strongly typed, object-oriented programming language, Apex allows developers to execute flow and transaction control statements on the Force.com platform server while performing calls to the Force.com API.
Read More »
1

August 2016 Hacks: 8 of the Largest Hacks, Breaches and Cyber Incidents

Sep 11, 2016 By Paul Curran | Summer 2016 has been a hot one for hackers, and August continued the trend of persistent attacks and breaches seen in June and July. This August, American institutions across all levels were hit particularly hard as the Democratic Party was hacked again by Guccifer 2.0, the National Security Agency had one of their sophisticated cyber weapons stolen and put up for auction and the FBI warned that the Board of Elections in two separate states had been targetted by possibly foreign hackers.   August 2016 hacks were unusual, such the release of patients’ urology information in Ohio, and alarming as seen in the theft of over $80 million dollars from the Bangladesh Bank over the long weekend. Read on to discover more of the cyber threats that targetted governments, citizens and financial institutions around the world in August 2016. 
Read More »
2016 us election hacks

2016 US Election Hacks in Arizona and Illinois Brief [INFOGRAPHIC]

Sep 08, 2016 By Paul Curran | In late August 2016, news broke that the FBI was investigating two hacks against the Board of Elections in Illinois and Arizona. With the fervor of the 2016 US elections reaching a tipping point as November nears, the possibility of a hack has raised serious concerns by both voters and voting officials especially as the electoral system becomes increasingly reliant on technology. While the numbers affected by these hacks are significantly smaller than other major hacks and breaches in 2016, the fact that there could be foreign meddling in either the elections process or voter data is a serious cause for alarm. Read our infographic to find out more about these 2016 US election hacks, the victims and the perpetrators.
Read More »
software security in 2016

Why in 2016 Software Security is as Big of a Deal as Ever

Sep 06, 2016 By Kevin Beaver | Year after year, new studies come out from popular vendors and research institutions underscoring that we have quite a ways to go with this thing we call security. Outside of the malware threat that grows a bit more complicated each year, the studies show that we continue to miss the bar in terms of protecting critical systems and sensitive information assets. In a nutshell, we’re missing the basics. That is, the flaws that we already know about and we have solutions for but haven’t yet found the time or political backing to resolve. Read why in 2016 software security, even basic application security, is still as important as ever.
Read More »
cyber security careers

Cyber Security Today: Career Paths, Salaries and In-Demand Job Titles

Aug 30, 2016 By Paul Curran | The constantly evolving threats from both hackers and state-sponsored actors, along with the expanding attack surfaces seen in the widespread adoption of IoT (internet of things devices), has led to a huge shortage of labor in the cyber security field. “The demand for the (cybersecurity) workforce is expected to rise to 6 million (globally) by 2019, with a projected shortfall of 1.5 million,” noted Symantec CEO Michael Brown. Now is the perfect time to be exploring options in cyber security careers.   According to Steve Morgan, Editor-In-Chief of the Cybersecurity Market Report, the demand for cybersecurity will result in over a million job openings in 2016 alone as the growing cyber security market continues to soar with a projected growth from $75 billion in 2015 to a $170 billion by 2020.
Read More »
future of cyber security

The Future of Cyber Security – Part 1: IOT Security

Aug 25, 2016 By Paul Curran | “One of the unique aspects of IoT (Internet of Things) is that it’s bringing cybersecurity into the physical realm.” Intel Security Group Senior VP Chris Young.   For those that didn’t live through the fear mongering surrounding the anticipated disasters stemming from Y2K, cyber security hasn’t been something that has made a major impact on the average person’s life.
Read More »
Screen Shot 2016-08-21 at 5.43.04 PM

Federal Forecast: Cyber Security in 2017

Aug 21, 2016 By Paul Curran | As America still reels from the damage created after the giant Office of Personnel Management (OPM) hack, it’s time to wonder what 2017 has in store for American federal cyber security. It’s not even over yet, and 2016 has been a big year not only for major breaches targeting federal agencies, but also for some big strides forward in the way that America’s treating the future of cyber security.  
Read More »
encryption security

All About Encryption: Security, News and a Brief History

Aug 18, 2016 By Paul Curran | WhatsApp recently made global headlines with the news that all forms of communication sent through the app feature end-to-end encryption. This additional layer of security which meant that all messages and files would be secured from falling into the wrong hands, but what is needed to properly encrypt data and what happens when sensitive data is not properly encrypted?  
Read More »

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

REQUEST A DEMO
Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.
Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.