Introducing Checkmarx Software Composition Analysis (CxSCA)

Tag: Developers

Discussing AppSec Policies within DevSecOps

There’s no denying that today’s digital ecosystem must be protected. But preventing increasingly frequent and severe attacks, which often target customer data and confidential information, requires more out of your organization’s security policies. Add in the challenge of organizations being asked to develop, deliver, and deploy software faster than ever before, many are finding that

Read More ›

RSA Conference 2020 Wrap-Up: From Software Security to SoulCycle

Another year, another RSA Conference USA in the books! From talking software security and DevOps with thousands of attendees, to launching new research and solutions, and hosting a SoulCycle fitness class for AppSec professionals, we had a blast at this year’s show and couldn’t be more grateful to all who helped make it such a

Read More ›

Free your Developers from Mundane Tasks

Across industries, developers and DevOps teams rely on routine, repetitive processes to log and manage their software security vulnerabilities. But these processes are often inefficient, and they don’t require creative human thought. Although opening or closing a ticket in a defect management system (such as JIRA), or initiating a scan during the CI process to

Read More ›

Adoption Exposure: Your Software Security Needs Integration and Automation

There are many software security solutions available today designed to provide insight into important security issues found during software development. As organizations begin moving forward with DevOps initiatives, are their current Application Security Testing (AST) solutions doing the work they need them to accomplish? If you haven’t integrated AST automatically into your vulnerability detection, triage,

Read More ›

One Common Theme – One Common Goal

On the heels of the RSA Asia Pacific and Japan conference that took place last week, there was one common theme that Checkmarx captured while speaking with visitors at their stand—imbedding security throughout an organizations’ DevOps ecosystem is viewed as a difficult barrier to overcome. Visitors to our booth who work in the field of

Read More ›

Houston [I mean Bulgaria], we’ve got a problem

Every relationship is built on trust. Trust is at the core of every lasting relationship, whether it’s between family members, between spouses, between organizations and their customers, and even between citizens and their government. At the start of this week, this trust was unfortunately violated in Bulgaria. The data of 5M people was leaked from

Read More ›

Code Exposure: The Vulnerabilities in Your Code & Where They Originate

Code Exposure: The Vulnerabilities in Your Code & Where They Originate Typical software applications are comprised of two types of code: custom code created by your internal development teams, and third-party code – often open source – created outside the organization. Until about 10 to 15 years ago, almost all software was custom code, and

Read More ›

Talking Cloud Technology is Yesterday’s News

Talking Cloud Technology is Yesterday’s News The other day I was on the phone with a colleague, discussing market trends of cloud computing. With me in the room was my 55-year old uncle, who heard bits of our conversation. After the call, he asked me why we spent so much time talking about clouds when

Read More ›

Checkmarx Named a June 2019 Gartner Peer Insights Customers’ Choice for Application Security Testing

Customer feedback is critically important in delivering security solutions that address modern business challenges while enabling key digital-transformation initiatives. It also provides the real-world insights other organizations need when making important purchasing decisions. At Checkmarx, we value customer feedback and rely on it heavily to shape our products and services. That’s why we’re thrilled to

Read More ›

9 Key Players for a Winning Security Team

9 Key Players for a Winning Security Team

Basketball legend Michael Jordan once said, “Talent wins games, but teamwork and intelligence win championships.” When it comes to something as important as your company’s security, you can’t afford to rely on anything less than a championship security team. What does a championship security team mean for your organization? You may have hired the best

Read More ›

Jump to Category