Tag : SAST

iStock_000011717477XSmall1-300x260

5 Ways To Protect Your Work Cyberspace

Nov 18, 2013 By Sharon Solomon | With hackers compromising virtually every software platform that exists, it’s time for all of us to step up our cyber security awareness. Security issues are crucial especially at work establishments, where sensitive information and data are susceptible to attack.

</Read More>

Monetary Authority of Singapore (MAS) Embraces SAST

Nov 15, 2013 By Sharon Solomon | Application security in Financial Information Systems (FIS) has become a must in today’s malicious cyberspace. Due to the wide range of solutions in the market, many software executives find it hard to pick the right defense strategy for their systems, which contain highly sensitive details and valuable information.

</Read More>

Checkmarx: Challenging The Application Security Field

Nov 05, 2013 By Sarah Vonnegut | This article originally appeared in Israeli publication The Marker. Read it in Hebrew here. 
By Jonathan Raveh
In a world where security breaches can cause enormous daily losses of up to millions of dollars, companies have started to develop a deeper understanding of what it takes to protect and secure the digital side of their operations as tightly as possible.

</Read More>
Eclipse-Logo

Cybercrime is on the rise !

Feb 21, 2013 By Administrator | Experts report that in 2012, 1.5 million users were affected by cybercrime daily…this is 18 people affected each second! The end user may take precautions to protect themselves and decrease the threat of cybercrime, but this is a small scale 1:1 scenario and only solves part of the problem. The fact remains clear and simple, the best way to fight cybercrime on a large scale is through precautionary measures from the developer.  Quality coding practices and certification benchmarking saves thousands of users from cyber security risks; it has a massive impact on the war against cybercrime.

</Read More>
Mission_Impossible

[WEBINAR] – 10 Steps to agile development without compromising security

Jan 23, 2013 By Administrator | Checkmarx is excited to announce our next webinar session – 10 Steps to agile development without compromising security. The webinar focuses on a topic that is gaining a lot of traction within the developer community – securing an agile development environment and in particular continuous integration and continuous deployment. Integrating security into these rapid-paced environments requires a mind-shift from the traditional SDLC measures we’ve all grown to use. Many organizations are now struggling to add security into these new processes but are not sure how, and what are the best practices. We can all benefit from the experience of those who have already adopted and secured these processes.

</Read More>
success

Dinis Cruz – Would I recommend Checkmarx as a SAST engine?

Dec 03, 2012 By Administrator | Dinis Cruz, of TeamMentor, wrote an interesting blog post recently about his experience of using Checkmarx’s source code analysis engine (SAST) after he’s been asked twice in the last week whether he would recommend using Checkmarx’s SAST engine. It’s important to note that Dinis wrote this blog post with no involvement / endorsement of any kind from Checkmarx. The post represents Dinis’ personal views of the SAST marketplace.

</Read More>
owasp_logo

Checkmarx Wins Award at OWASP Infosec India 2012

Sep 23, 2012 By Administrator | After a highly successful event at OWASP Infosec India last month, we would like to share with you some photos from the event and thank everyone who made the event a success. Thank you for all the visitors that attended our booth and discussed their source code analysis requirements with us.
To continue the dialog, request more information, please contact us. Alternatively you can sign up to start a FREE trial.

</Read More>
239px-SDLC_-_Software_Development_Life_Cycle-resized-600

Coding Security Into Applications – Secure SDLC

Jun 04, 2012 By Administrator | We wanted to share with you an excellent article written by Richard Janezic from midsizeinsider.com that covers the alarming state of application security, and how many of the current security vulnerabilities can be prevented by dedicating more thought into developing a secure coding methodology utilizing technologies that are available in the marketplace and considerably reduce the complexity of the task at hand.

</Read More>
flame

Flame Burns Right Through Windows Application Security

May 30, 2012 By Administrator | This week the cyber warfare stakes in the Middle East were raised a few notches when a Kaspersky Lab (Link) anti-virus expert discovered the Flame virus, which many have dubbed the most advanced and sophisticated cyber weapon ever unleashed. The Flame espionage worm, a previously unknown piece of malware was at the heart of a campaign to delete classified information from computers throughout the Middle East.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.