Adoption Exposure: Your Software Security Needs Integration and Automation

Adoption Exposure: Your Software Security Needs Integration and Automation

There are many software security solutions available today designed to provide insight into important security issues found during software development. As organizations begin moving forward with DevOps initiatives, are their current Application ...
Code Exposure: The Vulnerabilities in Your Code & Where They Originate

Code Exposure: The Vulnerabilities in Your Code & Where They Originate

Code Exposure: The Vulnerabilities in Your Code & Where They Originate Typical software applications are comprised of two types of code: custom code created by your internal development teams, and third-party code ...
Talking Cloud Technology is Yesterday’s News

Talking Cloud Technology is Yesterday’s News

Talking Cloud Technology is Yesterday’s News The other day I was on the phone with a colleague, discussing market trends of cloud computing. With me in the room was my 55-year old ...
Checkmarx Named a June 2019 Gartner Peer Insights Customers’ Choice for Application Security Testing

Checkmarx Named a June 2019 Gartner Peer Insights Customers’ Choice for Application Security Testing

Customer feedback is critically important in delivering security solutions that address modern business challenges while enabling key digital-transformation initiatives. It also provides the real-world insights other organizations need when making important purchasing ...

New in Repo – Repository Routing Helps Protect Against Dependency Hijacking Attacks

Nexus Repository Manager 3.17 introduces a new feature that allows organizations to better protect their supply chain dependencies against hijacking attacks. This new feature, known as Repository Routing, allows an administrator of ...

What 36,000 OSS Projects and 12,000 Commercial Dev Teams Taught Us About Secure Coding Practices

After ten months of research which involved studying 36,000 open source software projects, 12,000 enterprise development teams, and 3.7 million open source releases, we are pleased to announce the arrival of the ...

ZeroNights 2018, David Baptiste’s ‘Vulnerability In Compiler Leads To Stealth Backdoor In Software’

From The Video Description: It is a fact, software has bugs and compilers (software which build other software) are not an exception. The CVE-2018-8232 discloses a vulnerability found in ML compiler from ...
Android WebView: Are Secure Coding Practices Being Followed?

Android WebView: Are Secure Coding Practices Being Followed?

WebViews are very common on the Android applications. There are clear WebView security best practices, but are they being implemented? With our previous blog post in mind, Android WebView: Secure Coding Practices, ...
Introducing the Checkmarx Certified Engineer Program (CxCE)

Introducing the Checkmarx Certified Engineer Program (CxCE)

If you were to take a look at the current job market for developers, application security engineers, solution architects, penetration testers, or systems engineers, it’s clear that application security testing skill sets ...
SAML Flaws Discovered With SSO Implications

SAML Flaws Discovered With SSO Implications

Kelby Ludwig - writing at Duo Lab's has just posted a fascinating blog entry detailing their recent discovery of SAML vulns potentially affecting a range of implementations and deployments that could be ...
Loading...