Checkmarx Acquires Custodela to Bring Enhanced Automation to DevSecOps Programs!

Application Security Glossary

PCI DSS Compliance

Payment Card Industry Data Security Standards (PCI DSS) compliance can be a little daunting for development teams at first glance. These standards were last updated in May 2016, and they’re currently running on version 3.2. PCI DSS standards were developed to deliver stronger controls for credit card data to reduce fraud and increase customer protection.

Read More >>

Penetration Testing For Company Security

A penetration test, also known as a pentest, is a form of network security probe to determine if there are any vulnerabilities, or areas that could possibly be penetrated by an unauthorized user. Basically, a penetration test is an authorized attack on a company’s network and computer system in order to determine the level of network security, and to expose any vulnerabilities that could put company information or assets at risk.

Read More >>

PHP Scanner

A PHP scanner is a security solution designed to assess vulnerabilities of networks or applications for weaknesses of code written in PHP. There are many types of vulnerability scanners available today that cater to different customers and market segments.

Read More >>

PHP Static Code Analysis

PHP static code analysis is necessary if you want to ensure that your PHP code will deliver secure applications.

There are plenty of options on the market for PHP static code analysis. These include Klocwork, Atlassian, Checkmarx, etc. However, the real trick with selecting the right tool is to choose one which is accurate so results don’t contain a high rate of false positives / negatives. Such a solution provides developers with the confidence they need in order to act upon those findings. In addition, the way in which the findings are reported is also a key aspect. Scanning your code is a great step in the right direction for secure development but it’s only when the data is delivered in the way that your developers need that it can become an accepted part of your application development lifecycle.

Read More >>

Rootkit

Rootkit defined

The term Rootkit is a combination of two words: “root” and “kit.” A rootkit allows malicious attackers to gain “root” or full administrator privileges on a computer in order to perform unauthorized actions. This exploit can result in software execution, changes in system configuration files, accessing of log files, monitoring of user keyboard input, browsing and other navigational activities. Rootkits were formerly described as a suite of tools that would grant users access with full administrator rights. These days, rootkits are categorized as a type of malware, just like worms, viruses or Trojan horses.

Read More >>

Ruby On Rails Security

Ruby Defined

Ruby is an object-oriented programming language (OOPL) that was developed by Japanese developer Yukihiro “Matz” Matsumoto. Ruby is influenced by several other OOPLs including Perl, Lisp, Eiffel, Smalltalk and Ada. It is reflective and dynamic, with automatic memory management. It also supports a variety of programming paradigms such as imperative, functional, and of course, object-oriented.

Read More >>

SAMATE

The Software Assurance Metrics and Tool Evaluation (SAMATE) is a project developed by the National Institute of Standards and Technology to allow for better methods to be developed and deployed for software assurance.

The project has specific goals to develop a methodology to assess assurance tools for software development, which will be achieved through the use of specified tools with robust plans for tests and data sets for those tests. The idea is that SAMATE will then inform developers of assurance tools so that they can improve on their offerings. In the same breath, it will also allow users of assurance tools to make choices that are better informed.

Read More >>

Secure SDLC

What exactly is the SDLC?

Organizations developing applications have in-place a process by which each application is designed, developed, tested, and deployed. This sequence of stages that define these processes  is called the software development lifecycle, often referred to as the SDLC. An organization’s SDLC helps shape the way their apps are built and defines the exact processes each application should go through, as well as the milestones an application needs to hit before going to the next stage of the SDLC.

What exactly is a Secure SDLC?

A Secure SDLC is a process which has security touch points in every stage, as well as security milestones. Secure SDLC’s go above and beyond the current SDLC structure in order to ensure that the applications being deployed are secure upon release, without creating a delay in the original SDLC.

The biggest advantages of organizations adopting a secure SDLC is to create a high-quality, secure product

Read More >>

Security Vulnerability

A security vulnerability is a hole or weakness in an application’s code. The weak code could be a design flaw or an implementation bug. If discovered by a malicious actor, the weakness would allow an attacker to cause harm to the application in different ways, depending both on the kind of weakness and the kind of application.

The goal of application security is to reduce the amount of security vulnerabilities within the applications an organization uses and deploys, in effect minimizing the attack surface of the application.

Read More >>

Spoofing Attack

What is a Spoofing Attack?

A spoofing attack is when an attacker or malicious program successfully acts on another person’s (or program’s) behalf by impersonating data.

 

takes place when the attacker pretends to be someone else (or another computer, device, etc.) on a network in order to trick other computers, devices or people into performing legitimate actions or giving up sensitive data. Some common types of spoofing attacks include ARP spoofing, DNS spoofing and IP address spoofing. These types of spoofing attacks are typically used to attack networks, spread malware and to access confidential information and data.

Read More >>