Tag : Cyber Security

Celebrating National Cyber Security Awareness Month

Celebrating National Cyber Security Awareness Month

Oct 12, 2015 By Sarah Vonnegut | If you’re in need of a great excuse to strengthen – or start – an application security awareness program for your developers, this month is it. October, as you may already know, is National Cyber Security Awareness Month (NCSAM), and hundreds of security-focused organizations, including us, have come together in support of a more secure future for all.   Checkmarx is excited to have partnered up with the National Cyber Security Alliance (NCSA) and the Department of Homeland Security in promoting security awareness, and this year our aim is to raise awareness for application developers. As part of our participation in this year’s Cyber Security Awareness initiative, we’ve launched a site, SecureDevKit.com, dedicated – in October and throughout the year – to teaching developers how to write better, more secure code.  

</Read More>
cyber security blogs

29 Cyber Security Blogs You Should Be Reading

May 21, 2015 By Sarah Vonnegut | Staying up-to-date is important for lots of reasons, but when you’re a Cyber Security professional, knowing about the latest tech, breaches, vulnerabilities,etc. is pretty much essential to your career. If you miss out on an important piece of news, your organization could miss out on much more.   More than just knowing what’s going on, though, keeping current in cyber security news is an opportunity to absorb and uncover innovative ideas surrounding InfoSec and the way you do your job.

</Read More>
iStock_000036516038Small

Malaysian Airlines Flight MH370: First Ever Cyber-Hijack?

Mar 24, 2014 By Sharon Solomon | The Malaysian Airlines Flight MH370 probably crashed into the Indian Ocean, but what really went on inside the plane is yet to be revealed by investigators. Is it possible that the MH370 was actually cyber-hijacked by a seasoned hacker? Interestingly, relevant proof-of-concepts have already been demonstrated by InfoSec experts.  

</Read More>
iStock_000010131012Small

Justin Bieber Malware Spreading Across The Web

Jan 29, 2014 By Sharon Solomon | We all have different opinions on the Justin Bieber phenomenon, but there is no denying his star-power and influence over the younger generation. The Canadian star is constantly in the headlines for the wrong reasons, including a DUI arrest last week. Interestingly, this event has deeply affected information security worldwide.

</Read More>
iStock_000010705183XSmall

Top 5 Symptoms Of Hacked Computers

Jan 08, 2014 By Sharon Solomon | Cybercrime has reached epidemic proportions. More and more computers are being exploited with intrusive malware and sophisticated hacking techniques. It’s very crucial to detect intrusions to minimize data loss and avoid privacy theft. 

</Read More>
iStock_000031268478Small-300x156

Virtual Reality, Meet Hard Reality: The World of Warcraft Crackdown & What It Could Mean For Cybercrime in China

Dec 31, 2013 By Sarah Vonnegut | Last week in the Zhejiang province of China, 10 men were sentenced to prison terms of up to two years for accessing over 11,500 World of Warcraft accounts. The men didn’t hack into the accounts, but instead bought the login details for the accounts on the black market, then sold each player’s gear and accumulated gold to other gamers within the game.

</Read More>
iStock_000012268428Small-300x212

Cache of 2 Million Account Details For Facebook, Google, Yahoo Users Discovered

Dec 05, 2013 By Sarah Vonnegut | Some two million accounts on several of the most widely visited social media networks, email providers and websites were just discovered on a server with a bogus IP in the Netherlands. Hackers stole login usernames and passwords for Facebook, LinkedIn, Google, Twitter and various other popular sites.

</Read More>
iStock_000007816098Small-300x199

Cybersecurity Checklist For Holiday Shopping & Travel

Nov 27, 2013 By Sarah Vonnegut | For many in the U.S., the Thanksgiving weekend officially begins at the end of today’s work day and thus starts the beginning of the holiday season. This year there will already be enough pains to deal with: congested roads, packed stores and airports, not to mention messy weather. One headache you can avoid is Cybercrime, so take these fairly simple steps to keep yourself and your gadgets secure while traveling and shopping.

</Read More>
Webinar1-97x300

Checkmarx and Security Innovation present: Faster & Better Remediation [Webinar]

Nov 25, 2013 By Sharon Solomon | FASTER & BETTER REMEDIATION [Webinar]: WITH SECURITY INNOVATION’S TEAMMENTOR AND CHECKMARX’S CXSUITE. Click HERE to register.  Software security requires that software teams create secure code and validate that the resulting executables are not vulnerable. Static security analysis tools allow development teams to locate and mitigate security issues during the development process. In the meanwhile, security guidance reduces the number of security scan cycles that involve QA, Information Security or other teams.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.