Checkmarx Launches Infrastructure as Code Scanning Solution to Secure Cloud-Native Applications: KICS

Tag: Software Composition Analysis

Securing the Online Storefront: Digital Transformation for Growing eCommerce Businesses

Fenny Kuo, software and cyber security specialist at Galaxy Software Services (GSS) shares her insight into what is happening in Taiwan and further afield in the area of eCommerce, crime and rapid digital transformation. Among the many global impacts of COVID-19 one very noticeable effect was on the way we buy on the Street –

Read More ›

Exploitable Path – Advanced Topics

This is the third and final blog on Exploitable Path – a unique feature that allows our customers to prioritize vulnerabilities in open-source libraries. In the first blog, we introduced the concept of Exploitable Path and its importance. The conclusion was that a vulnerability in a library is considered exploitable when: The vulnerable method in

Read More ›

Exploitable Path – How To Solve a Static Analysis Nightmare

In my previous blog, I walked you through the reasoning and importance of the Exploitable Path feature in Checkmarx SCA solution. We discussed the challenges of prioritizing vulnerabilities in open source dependencies and defined what it means for a vulnerability to be exploitable: The vulnerable method in the library needs to be called directly or

Read More ›

Addressing the Challenges of Open Source Software

Although software is significantly changing our work, home, and personal lives, many don’t realize that today’s software is made up of numerous ingredients. Some of the software we use daily contains pieces of custom code that’s developed internally by an organization, while other pieces of code come from community-driven open source projects that end up

Read More ›

Solving ISA’s 2021 Web Challenges

Being part of the Checkmarx SCA Research Team who supports our next-gen Software Composition Analysis (SCA) solution, my team members and I often participate in Capture the Flag (CTF) types of competitions to hone our skills and share our knowledge with the rest of the team. Not only are we expected to be skilled defenders,

Read More ›

Jump to Category