Tag : Source Code Analysis

Deloitte

Checkmarx Reaching New Heights – Now Second Highest Ranked Security Company In 2013 Deloitte Fast 500

Dec 16, 2013 By Sharon Solomon | Checkmarx is breaking all barriers. The Israeli IT Security firm has stormed into the Deloitte top-500 fastest growing EMEA companies, taking 69th place overall in the 2013 rankings. Technology Top 500 is a unique ranking research project, conducted annually by Deloitte Touche Tohmatsu Limited (DTTL). Technology, telecommunications, software and internet companies are scanned and studied during the ranking process. Both private and public sector concerns are eligible for evaluation.

</Read More>
iStock_000017757979XSmall

Stop the Neglect – Scan Your Source Code Before You Regret

Dec 11, 2013 By Sharon Solomon | Hacktivism, commercial malware and criminal exploitation have become the norm in today’s cyberspace. This worrying trend has magnified the need for a comprehensive testing solution that can be integrated into the SDLC. Enter Source Code Analysis (SCA).

</Read More>

Checkmarx: Challenging The Application Security Field

Nov 05, 2013 By Sarah Vonnegut | This article originally appeared in Israeli publication The Marker. Read it in Hebrew here. 
By Jonathan Raveh
In a world where security breaches can cause enormous daily losses of up to millions of dollars, companies have started to develop a deeper understanding of what it takes to protect and secure the digital side of their operations as tightly as possible.

</Read More>
Eclipse-Logo

Cybercrime is on the rise !

Feb 21, 2013 By Administrator | Experts report that in 2012, 1.5 million users were affected by cybercrime daily…this is 18 people affected each second! The end user may take precautions to protect themselves and decrease the threat of cybercrime, but this is a small scale 1:1 scenario and only solves part of the problem. The fact remains clear and simple, the best way to fight cybercrime on a large scale is through precautionary measures from the developer.  Quality coding practices and certification benchmarking saves thousands of users from cyber security risks; it has a massive impact on the war against cybercrime.

</Read More>
Mission_Impossible

[WEBINAR] – 10 Steps to agile development without compromising security

Jan 23, 2013 By Administrator | Checkmarx is excited to announce our next webinar session – 10 Steps to agile development without compromising security. The webinar focuses on a topic that is gaining a lot of traction within the developer community – securing an agile development environment and in particular continuous integration and continuous deployment. Integrating security into these rapid-paced environments requires a mind-shift from the traditional SDLC measures we’ve all grown to use. Many organizations are now struggling to add security into these new processes but are not sure how, and what are the best practices. We can all benefit from the experience of those who have already adopted and secured these processes.

</Read More>
owasp_logo

Checkmarx Wins Award at OWASP Infosec India 2012

Sep 23, 2012 By Administrator | After a highly successful event at OWASP Infosec India last month, we would like to share with you some photos from the event and thank everyone who made the event a success. Thank you for all the visitors that attended our booth and discussed their source code analysis requirements with us.
To continue the dialog, request more information, please contact us. Alternatively you can sign up to start a FREE trial.

</Read More>

What’s HOT in Application Security Vol #29

Sep 18, 2012 By asaphs | More than half of all companies experienced a security breach in the past year and a half
More than half of all companies in the world experienced some kind of security breach in the past 18 months; worrying statistic, given the level of damage a security breach can do to a company. The statement comes from a report which was released last week dubbed the “Software Security Risk Report”.

</Read More>

What’s HOT in Application Security Vol #20

Jul 16, 2012 By Administrator | Yahoo left red-faced after SQL injection vulnerability reveals nearly half a million passwords!
A hacking group who name themselves ‘DD3Ds Company’ have, within the last few days leaked 453,492 yahoo text passwords for Yahoo accounts. DD3Ds Company now claim that they attained the passwords by means of SQL injection against a poorly secured Yahoo subdomain. Security experts have named the it as Yahoo Voices.

</Read More>

What’s HOT in Application Security Vol #19

Jul 09, 2012 By Administrator | Cyber Attacks on ATM and online banking are at an all time high
Cyber Attacks which are aimed at online banking applications are at an all time high, according to several security experts. Unsurprisingly, almost one third of all attacks were aimed at banks which reside in the Gulf, where the banks are swelling with oil money and where small amounts of money missing from accounts are likely to go un-noticed.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.