A Message From Our CEO: Checkmarx’s Acquisition & The Road Ahead

A Message From Our CEO: Checkmarx’s Acquisition & The Road Ahead

We are all living in unconventional and unprecedented times. The entire world is adjusting to the rapidly-changing dynamics brought on by Coronavirus (COVID-19). Here at Checkmarx, we are taking deliberate and preventative ...
direct memory attack

Eclypsium Researchers Demonstrate Direct Memory Attacks

Researchers from Eclypsium, a provider of secure firmware, disclosed this week that they have been able to launch successful direct memory access (DMA) attacks that bypass security frameworks such as UEFI Secure ...
Security Boulevard
Kotlin Guide: Why We Need Mobile Application Secure Coding Practices

Kotlin Guide: Why We Need Mobile Application Secure Coding Practices

October is the annual National Cybersecurity Awareness Month (NCSAM), which is promoted by the U.S. Department of Homeland Security and the National Initiative for Cybersecurity Careers and Studies (NICCS). According to the ...
Becoming Optimus Prime Within Your AppSec Initiatives

Becoming Optimus Prime Within Your AppSec Initiatives

When I was a child, I didn’t dream of becoming a legendary football player or a rock star. My dream was to become a Transformer: specifically Optimus Prime. I am sure some ...

DevSecOps & Chaos Engineering: Knowing the Unknown

Engineered chaos - is that an oxymoron? Not really. By creating chaos in your software development environments you help build more stable and secure systems. Why is this valuable and how can ...

Why Software Composition Analysis (SCA) Demands Precision

As leaders in software composition analysis (SCA), we know its role throughout today’s software supply chain. SCA was born out of necessity. How else could innovators discover, identify, and track open source ...
The Open Source Cookbook: A Baker’s Guide to Modern Application Development

The Open Source Cookbook: A Baker’s Guide to Modern Application Development

It is often said that open source software is like a recipe. In this context, let’s discuss your grandmother’s favorite cookies. It’s quite possible your grandmother is known throughout the family as ...
Demystifying PCI Software Security Framework: All You Need to Know for Your AppSec Strategy

Demystifying PCI Software Security Framework: All You Need to Know for Your AppSec Strategy

If your organization is developing a payment app or even just using one in your product, then this webinar is for you.  The Payment Card Industry (PCI) Security Standards Council recently released a new security framework to ...
Huawei P10

Addressing UK Security Concerns in Huawei Products May Take 5 Years, Exec Says

Huawei’s been having a rough time recently. After the US, New Zealand and Australia prevented the telecom company from working on their 5G mobile networks for fear it would spy for the ...