Checkmarx Acquires Custodela to Bring Enhanced Automation to DevSecOps Programs!

Checkmarx Blog

Brexit & Its Impact on Cybersecurity

The United Kingdom leaving the European Union – aka Brexit (shorthand for British Exit) – is a decision which has generated much gossip and speculation within the cybersecurity community. In general, there is no doubt that the result of the Brexit referendum, held in June last year, will have an impact on many industries and

Read More ›

Six Steps to Secure Software Development in the Agile Era

Written in 2001, the Agile Manifesto launched an evolution in software development that has unfolded over the past decade and a half. Moving from waterfall development to rapid development and into the Agile methodology, software companies around the world have adopted at least some of the Agile processes and practices. And for many organizations, the

Read More ›

BSIMM in the Age of Agile

Since 2009, the Build Security in Maturity Model (BSIMM) has been helping organizations across a wide range of verticals build long-term plans for software security initiatives based on actual observed data from the field provided by nearly 100 participating firms.   In the most recent BSIMM report, released in late 2016, BSIMM co-author and inventor

Read More ›

How You can be Coding Securely in Go

For the third year in a row, Go has made the top 5 most loved programming languages and ranks number three in terms of “most wanted” programming language in Stack Overflow’s 2017 developer survey.   Additionally, Go developers are also among the top 5 highest paid according to tens of thousands of respondents of the

Read More ›

March 2017: Top Hacks and Breaches [INFOGRAPHIC]

The month of March in hacks and breaches began strong with discovery of a database containing 1.4B records left exposed by one of the biggest senders of spam. A few days after, WikiLeaks released details on secret CIA hacking tools used to break into computers, mobile devices, and smart TVs.  On the 13th of March,

Read More ›

7 Ways to Win Over Your CISO

Security maturity, as cliche as it sounds, is a journey – not a destination. Security is never “done”; there is always more to be done, new technologies or processes to secure, evolving business objectives with which to align.   The great part about being on the security team is that you don’t have to be

Read More ›

The History of Application Security Testing – Part 2

Last week, we discussed the early history of computer security, tracing back to World War II and the “bombe”. This week, we’re looking back to the origins of the internet and how application security testing became an invaluable part of enterprise security. Here we go! Read Part 1 of The History of Application Security Testing HERE

Read More ›

Bamboo vs Jenkins

The adoption of DevOps increased from 66 percent in 2015 to 74 percent in 2016 and the trend shows no sign of slowing down in 2017.   As more enterprises expand their teams working on continuous integration (CI), deployment, and delivery, there is an increasing demand to find the best solution to fit their deployment

Read More ›

What You Need to Know: Julian Assange & WikiLeaks [INFOGRAPHIC]

Julian Assange is an Australian activist, computer programmer, and hacker who, in December 2006, founded WikiLeaks. His goal was to provide a platform where classified and sensitive documents can be posted anonymously.   Since its’ start, WikiLeaks drew a lot of attention following some major information exposed on the site, however the first major leak resulting

Read More ›

Jump to Category