Rise of the Machines: AI and Security – Free Webinar with Checkmarx’ CTO

Tag: information security

cyber security careers

Cyber Security Today: Career Paths, Salaries and In-Demand Job Titles

The constantly evolving threats from both hackers and state-sponsored actors, along with the expanding attack surfaces seen in the widespread adoption of IoT (internet of things devices), has led to a huge shortage of labor in the cyber security field. “The demand for the (cybersecurity) workforce is expected to rise to 6 million (globally) by

Read More ›

The Importance of Database Security and Integrity

Databases often hold the backbone of an organization; Its’ transactions, customers, employee info, financial data for both the company and its customers, and much more. are all held in databases, often left to the power of a database administrator with no security training. Database security and integrity are essential aspects of an organization’s security posture.

Read More ›

Verizon 2016 Data Breach Investigation Report

Verizon 2016 Data Breach Investigation Report – Takeaways

For the ninth consecutive year, Verizon has published its annual Data Breach Investigations Report (DBIR). Read on to find out Checkmarx’s key takeaways from the Verizon 2016 Data Breach Investigations Report report. The 2016 Data Breach Investigations Report is based on a final dataset of 62,199 security incidents and 2,260 data breaches. These incidents affect

Read More ›

A Quick Guide to Ethical Hacking + Top Hacking Tools

They say the best defense is a great offense – and with application security, that’s certainly a big factor in staying ahead of the hackers. Organizations keen on keeping malicious hackers out of their systems will use any number of offensive measures as a way to find the kinds of holes attackers could use against

Read More ›

29 Cyber Security Blogs You Should Be Reading

Staying up-to-date is important for lots of reasons, but when you’re a Cyber Security professional, knowing about the latest tech, breaches, vulnerabilities,etc. is pretty much essential to your career. If you miss out on an important piece of news, your organization could miss out on much more.   More than just knowing what’s going on,

Read More ›

CISO Gary Hayslip, San Diego

CISO Insights: How the CISO of San Diego Secures His City

This article is the first in a series of interviews with CISOs in various industries. Our goal is to share our conversations with different Chief Information Security Officers about how they deal with daily tasks as well as the bigger picture of innovating security practices around business operations.   Gary Hayslip is currently the Deputy

Read More ›

16 CISOs and Security Leaders You Should be Following on Twitter

A few months ago we published an article, ’21 AppSec & Security Gurus You Should Be Following on Twitter,’ and even we were surprised with the buzz it created. It seems we had hit a chord with our readers, who are apparently pining for new security people to follow on Twitter. So, to feed your hunger

Read More ›

What’s Holding You­­­­ Back from Securing Your Code?

Organizations today are aware of security risks they can be exposed to as a result of bad or wrong code practice.  However, while awareness is the first step, being able to act is a whole other ballgame. After witnessing more and more companies being hit by attacks based on well-known vulnerabilities, we sought to understand what’s holding organizations

Read More ›

5 Habits of Highly Effective Application Security Leaders

In our global, digital world, data is king – and malicious attackers are on a constant lookout for ways to conquer the throne. With a rapidly changing business landscape,the old, reactive approaches to security are no longer enough – if they ever were. Effective application security leaders are changing their tactics to keep up with the transformations. 

Read More ›

7 Essential Resource Centers to Boost Your InfoSec IQ

Many applications today possess critical vulnerabilities – SQL injections (SQLi), Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF) being just a few of them. The first step in combating these security issues is getting to know how they work and learning about them from real life scenarios. Unfortunately, not all developers today are familiar with the

Read More ›

Jump to Category