Meetup Vulnerabilities: Escalation of Privilege and Redirection of Funds

Checkmarx Blog

Recommendations for Friends and Family on Staying Cyber Safe While Working Remotely

The world as a whole is coming together to quell the spread of COVID-19 by limiting social interaction, and in some instances, initiating full quarantines. Schools are closed for weeks, if not longer. Organizations have initiated very strict work from home policies to keep employees safe, and many restaurants and bars are only open for

Read More ›

A Message From Our CEO: Checkmarx’s Acquisition & The Road Ahead

We are all living in unconventional and unprecedented times. The entire world is adjusting to the rapidly-changing dynamics brought on by Coronavirus (COVID-19). Here at Checkmarx, we are taking deliberate and preventative measures to protect our global community of employees, customers, and partners. Our top priority is the health and safety of our team and

Read More ›

Discussing AppSec Policies within DevSecOps

There’s no denying that today’s digital ecosystem must be protected. But preventing increasingly frequent and severe attacks, which often target customer data and confidential information, requires more out of your organization’s security policies. Add in the challenge of organizations being asked to develop, deliver, and deploy software faster than ever before, many are finding that

Read More ›

RSA Conference 2020 Wrap-Up: From Software Security to SoulCycle

Another year, another RSA Conference USA in the books! From talking software security and DevOps with thousands of attendees, to launching new research and solutions, and hosting a SoulCycle fitness class for AppSec professionals, we had a blast at this year’s show and couldn’t be more grateful to all who helped make it such a

Read More ›

Free your Developers from Mundane Tasks

Across industries, developers and DevOps teams rely on routine, repetitive processes to log and manage their software security vulnerabilities. But these processes are often inefficient, and they don’t require creative human thought. Although opening or closing a ticket in a defect management system (such as JIRA), or initiating a scan during the CI process to

Read More ›

Jump to Category