Checkmarx Blog

blog-coding-securily-in-javascript

How You Can Be Coding Securely in JavaScript

Sep 18, 2017 By Arden Rubens | According to Stack Overflow’s annual Developer Survey, JavaScript dominates as the most commonly used programming language for the fifth year in a row and remains the #1 most popular language by occupation. With its top spot in the programming language world, it should come as no surprise that JavaScript is absolutely everywhere – from your servers to your smartphones.  
Read More »
blog-the-equifax-data-breach-what-you-need-to-know

The Equifax Data Breach: What You Need To Know

Sep 11, 2017 By Arden Rubens | All data breaches are bad, but this past Thursday the United States was shook by one of the biggest breaches the world has ever seen. Equifax, a credit monitoring company, disclosed that the breach of its system exposed the Social Security Numbers, driver’s licenses, phone numbers, birthdays and addresses of as many as 143 million Americans.  
Read More »
blog-august-infographic

August 2017: Top Hacks and Breaches [INFOGRAPHIC]

Sep 04, 2017 By Arden Rubens | New research shows that at the end of 2016, predictions were being made that the amount of cyberattacks are set to double in 2017 – as we are inching towards the end of 2017, those predictions were made true. And then some. August proved to be a busy month, with cyberattacks hitting every sector and some big names across industries. Let’s take a closer look at the month of August in hacks and breaches.  
Read More »
blog-jenkins

A Closer Look: Securing with Jenkins

Aug 28, 2017 By Arden Rubens | Acclaimed by the DevOps world and best known as the leading open source automation server for continuous integration (CI) and continuous delivery (CD), Jenkins is a Java-based program designed to monitor a set of executions in a software environment. Jenkins allows developers to rapidly detect and resolve errors in the code base and boosts automated build testing.  
Read More »
blog-hbo-hacks

Timeline: HBO’s Month of Hacks [INFOGRAPHIC]

Aug 21, 2017 By Arden Rubens | For the web is dark and filled with hackers…   Winter came for HBO at the start of August, as they were hit with hacks and data leaks (and a couple of their own mistakes). And as August progresses, we feel it’s safe to say that August marks the Long Night for the cable network, as every few days a new leak or development in the story makes headlines.  
Read More »
blog-php-framework

An In Depth Look: Top PHP Frameworks

Aug 10, 2017 By Arden Rubens | PHP is an open source scripting language designed for web development. When the language was first released in 1994, PHP stood for Personal Home Page. Today, PHP is referred to as a backronym – PHP, Hypertext Preprocessor.   PHP is a dynamic language allowing developers run their code instantly, without having to compile it first. What makes PHP unique from other client-side languages is that the code is executed on the server which generates HTML before it’s sent to the client.  
Read More »
blog-wireless-ip-cams

Are You Being Watched Through Your Connected Cameras?

Aug 02, 2017 By Arden Rubens | In October 2016, a massive distributed denial-of-service (DDoS) attack left millions of people around the world without major websites – including Twitter, Reddit, and Amazon – by taking them off the grid. This was directly caused by attackers easily guessing easy/default passwords on wireless IP cameras which were infected with a malware and then used to create a botnet. This incident is not only considered one of the biggest cyberattacks ever, but also one of the more recent hacks and breaches revolving around webcams and wireless IP cameras.  
Read More »
blog-july-infographic

July 2017: Top Hacks and Breaches [INFOGRAPHIC]

Jul 31, 2017 By Arden Rubens | With July being the official halfway mark in the year, it’s safe to say that 2017 is giving us both the expected and not-expected hacks and breaches, hitting every industry and affecting just about every country in our world. And this is coming at a pretty high cost. According to a report released by Lloyd’s of London, a major, global cyber attack can trigger about $53 billion of financial losses; a number equivalent to the financial loss of a disastrous natural disaster.  
Read More »
blog-cx%2fcb

We’re excited to announce the acquisition of Codebashing!

Jul 25, 2017 By Arden Rubens | We’re excited to announce the acquisition of Codebashing, a leading application security education platform that specializes in delivering interactive secure coding education for developers, aiming to empower developers with bite-sized interactive lessons to understand the principles of application security.   For organizations across the globe, reaching and maintaining application security is a major challenge. The increasing number of exploits, vulnerabilities, and the bleak repercussions the affected organizations face is a constant reminder of how important strong application security is. Yet, in so many cases, the biggest security risk organizations have is the lack of secure coding knowledge.  
Read More »
blog-the-abcs-of-appsec-testing-iast-dast

The ABCs of AppSec Testing: IAST & DAST

Jul 24, 2017 By Arden Rubens | As applications are being hit harder than ever with increasingly sophisticated cyberattacks, organizations are turning to application security testing solutions to keep their applications safe. And as organizations take a peek into the AppSec testing market, they are sure to see many different options. In this blog post we will take a look at two solutions: IAST and DAST.  
Read More »

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Get a Checkmarx Free Demo Now

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.