Tag : Cloud Security

What’s HOT in Application Security Vol #8

Apr 16, 2012 By Administrator | Would you Trade your freedom for Application Security?
OWASP’s Dan Greer recently gave the keynote speech at the “Application Security Matters’ conference where he delved into the problems and issues arising from the inconsistencies in application security. There are many things which contribute to lousy application security- not taking the necessary steps to protect your code, protect your data and poorly written and bloated code. What can one do about it?

</Read More>

What’s HOT in Application Security Vol#6

Mar 26, 2012 By Administrator | Application Security- Not Sufficient!
A study was recently conducted among 800 It executives which found that there is a huge difference between the perception of Security from the viewpoint of the developer and security professionals. Security professionals view the applications in a far more optimistic light- stating that they are secure enough, whilst developers say that their applications run in their enterprise are no way near secure enough.

</Read More>

What’s HOT in Application Security Vol #3

Mar 07, 2012 By Administrator | Let’s understand the web application security dilemma! Organizations within the financial services industry track an average of 800 attacks, organizations out with the financial services industry track an average of 500 attacks- no wonder it’s so vital to understand application security. It’s said that the security challenge is due to the fact that most of these applications are web enabled. Companies which rely on SAAS and applications that are operating from portable devices are also at an increased risk as they are by definition, web enabled. Why even worry about application security?

</Read More>

What’s HOT in Application Security Vol #1

Feb 20, 2012 By Administrator | Hackers in China accused of a long term breach of Nortel For almost ten years Chinese hackers gained complete access to the internal network of Nortel Networks, Ltd. Nortel was previously considered to be a telecommunications power house but has been struggling financially in recent years. The hackers stole several passwords from top Nortel executives (who were apparently working in China) sometime during the year
2000 and over the years downloaded a range of technical papers, business plans and employee information- this information is according to Brian Shields, who is now leading the internal investigation.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.