Checkmarx Named a Leader in Gartner Magic Quadrant for Application Security Testing

Checkmarx Blog

Static Code Analysis: Binary vs. Source

“The application security testing market is growing rapidly … This is the highest growth of all tracked information security segments, as well as the overall global information security market” – Gartner’s 2017 Magic Quadrant.   Within the broad and ever growing application security realm, code analysis has become a standard which is practiced by leading

Read More ›

Android WebView: Secure Coding Practices

Nowadays, there is no doubt that mobile applications have changed the world in a big way. Just look at the interaction habits, for example the way people socialize as individuals or in a group has changed as what was once far away is now at our fingertips. This is part one of a four-part series. Click

Read More ›

A Simple Coding Error Put Millions of Smartphone Users at Risk: What You Need to Know

As many as 180 million smartphone users are at risk of having texts and calls hijacked by hackers – all due to a simple coding error in at least 685 different mobile apps. A warning was released by the cybersecurity firm Appthority late last week. According to Appthority, the vulnerability (known as Eavesdropper) could let

Read More ›

South Africa’s Biggest Data Breach: What You Need To Know

A trove of data containing the personal information of more than 60 million South African citizens has been breached in the biggest data breach to hit South Africa. The breach was discovered by security researcher and creator of Have I Been Pwned, Troy Hunt.  

Read More ›

Continuous Security Testing for Microservices

Being a part of today’s tech-industry, you probably notice all winds blowing towards the implementation of DevOps and CI\CD methodologies, and rightfully so. Today’s software developers face an ever growing need for speedy development-to-production cycles with uncompromising security and reliability. One way of facing the speed versus quality challenge is the introduction of microservices.  

Read More ›

3 Ways to Prevent XSS

When we discuss vulnerabilities in applications, there are different categories that we come across. Some vulnerabilities are extremely common yet allow for little or no damage should an attacker discover and exploit them, while others are incredibly rare but can have major, lasting impact on the organizations behind the attacked application. Then, there’s the third

Read More ›

Why You Need Automated Security in an Agile Software Environment

Why You Need Automated Security in an Agile Software Environment

Today’s business cycles require faster and more innovative results more than ever before in order to stay competitive. As organizations speed up their time to market, they are realizing the waterfall methodology is no longer working. Now they are creating and adopting rapid application development methodologies. One of those methodologies, agile software development is arguably

Read More ›

Jump to Category