Adoption Exposure: Your Software Security Needs Integration and Automation

Adoption Exposure: Your Software Security Needs Integration and Automation

There are many software security solutions available today designed to provide insight into important security issues found during software development. As organizations begin moving forward with DevOps initiatives, are their current Application ...
One Common Theme – One Common Goal

One Common Theme – One Common Goal

On the heels of the RSA Asia Pacific and Japan conference that took place last week, there was one common theme that Checkmarx captured while speaking with visitors at their stand—imbedding security ...
Houston [I mean Bulgaria], we’ve got a problem

Houston [I mean Bulgaria], we’ve got a problem

Every relationship is built on trust. Trust is at the core of every lasting relationship, whether it’s between family members, between spouses, between organizations and their customers, and even between citizens and ...
Code Exposure: The Vulnerabilities in Your Code & Where They Originate

Code Exposure: The Vulnerabilities in Your Code & Where They Originate

Code Exposure: The Vulnerabilities in Your Code & Where They Originate Typical software applications are comprised of two types of code: custom code created by your internal development teams, and third-party code ...
Talking Cloud Technology is Yesterday’s News

Talking Cloud Technology is Yesterday’s News

Talking Cloud Technology is Yesterday’s News The other day I was on the phone with a colleague, discussing market trends of cloud computing. With me in the room was my 55-year old ...
Checkmarx Named a June 2019 Gartner Peer Insights Customers’ Choice for Application Security Testing

Checkmarx Named a June 2019 Gartner Peer Insights Customers’ Choice for Application Security Testing

Customer feedback is critically important in delivering security solutions that address modern business challenges while enabling key digital-transformation initiatives. It also provides the real-world insights other organizations need when making important purchasing ...
A New EU Cybersecurity Regulation and Why It’s Important

A New EU Cybersecurity Regulation and Why It’s Important

On the heels of GDPR and what it meant to the rest of the world outside of the EU, another EU cybersecurity regulation is on the horizon. Most organizations remember the effort ...
Demystifying the myth of an AppSec silver bullet

Demystifying the myth of an AppSec silver bullet

Can a single approach to application security solve all of your problems? Relying on a single testing solution to protect your applications is essentially like trying to protect your house from burglars, ...
Vulnerable Software – The Gift that Keeps on Giving

Vulnerable Software – The Gift that Keeps on Giving

Concerning the latest data breaches on record, this past May was rather noteworthy. A host of organizations from around the world announced in fact, that they had experienced a data breach. From ...
What the heck is IAST?

What the heck is IAST?

The application security testing (AST) world is made up of different solutions, all with one ultimate goal – to protect software from hackers, and their attacks. SAST and DAST are perhaps the ...