9 Key Players for a Winning Security Team

9 Key Players for a Winning Security Team

Basketball legend Michael Jordan once said, “Talent wins games, but teamwork and intelligence win championships.” When it comes to something as important as your company’s security, you can’t afford to rely on ...
Creating A fake Google Mail Sign in Template

Don’t Get Phished – 7 Tips to Avoid This Common Cyber Attack

Phishing is the most common type of cyber-attack that impacts organizations both large and small. These attacks may take many forms, but they all share a common goal – getting you to ...
Managing Software Security: 10 Essential Best Practices [Infographic]

Managing Software Security: 10 Essential Best Practices [Infographic]

Is your software security program up to the challenges of a rapidly accelerating software delivery environment? Most aren’t – and it’s challenging to both identify the problems and determine the best ways ...
10 Tips to Take Control of Your Public Wi-Fi Security

10 Tips to Take Control of Your Public Wi-Fi Security

The amazing ability to surf from anywhere sometimes distracts us from a very basic fact: the information may flow to us – but it can flow from us, in other, undesirable directions.So ...
Learn 10 Key Tips to Make Your Software Security Program Thrive

Learn 10 Key Tips to Make Your Software Security Program Thrive

The DevOps era brings together skyrocketing complexity with white-hot speed of delivery to create growing value and responsiveness in software design. Companies such as Amazon deploy code every 11 seconds, while Facebook ...
Comparing the 2013 list to the newly released 2017 list

A Closer Look: OWASP Top 10 2017 – Application Security Risks

Open Web Application Security Project (OWASP) is an organization filled with security experts from around the world who provide information […] The post A Closer Look: OWASP Top 10 2017 – Application ...
Continuous Security Testing for Microservices

Continuous Security Testing for Microservices

Being a part of today’s tech-industry, you probably notice all winds blowing towards the implementation of DevOps and CICD methodologies, […] The post Continuous Security Testing for Microservices appeared first on Checkmarx ...
3 Ways to Prevent XSS

3 Ways to Prevent XSS

When we discuss vulnerabilities in applications, there are different categories that we come across. Some vulnerabilities are extremely common yet […] The post 3 Ways to Prevent XSS appeared first on Checkmarx ...
Why You Need Automated Security in an Agile Software Environment

Why You Need Automated Security in an Agile Software Environment

Today’s business cycles require faster and more innovative results more than ever before in order to stay competitive. As organizations […] The post Why You Need Automated Security in an Agile Software ...
A Closer Look: Securing with Jenkins

A Closer Look: Securing with Jenkins

Acclaimed by the DevOps world and best known as the leading open source automation server for continuous integration (CI) and […] The post A Closer Look: Securing with Jenkins appeared first on ...
Loading...