服务
合作伙伴
现在可与 Checkmarx 软件组合分析 (SCA) 一起使用,该解决方案恢复了对现代应用程序开发的信任,同时让开发人员接受开源代码 Read More
The FBI and the US Department of Justice (DOJ) want cyberattacks to be given almost the same priority as terrorist attacks. Christopher Wray, the director of the FBI, in an interview with the Wall Street Journal. Read More
The FBI and Justice Department upped the ante on the rhetoric around ransomware attacks, telling a number of news outlets that cyberattacks will be treated with almost the same level... Read More
Tackling IaC security can help businesses avoid the jaws of defeat, says Robert Haynes, SCA & Open Source Evangelist, at app security testing company Checkmarx. Read More
Where should organisations begin when looking at how to secure cloud-native applications? Read More
The anniversary provides the perfect opportunity to reflect on how increased consumer and business reliance on online services has meant to the integrity of data. Read More
It’s been three years since the GDPR was enforced. Compliance with the EU data privacy regulation remains an ongoing challenge for organisations as do raising cyber security expectations and threats. Read More
The editors at Solutions Review, as well as industry experts, reflect on the impact and effects of GDPR three years after it passed. Read More
Supply chain cyber attacks are trending up. While they aren’t new, there’s a clear and concerning trend taking place with third-party software and service providers rapidly becoming attackers’ favorite target. Read More
Mental Health Awareness Month is a good reminder for managers to check in with their software developers and address their mental, emotional and physical needs. Read More
A new report finds that the vast majority of app developers are knowingly pushing vulnerable code, and that truly secure applications capable of repelling a determined attacker are few and far between. Read More
As digital transformation efforts advance and cloud-native becomes more popular, the role of application security within cloud-native architectures needs to become a priority. Read More
Cybersecurity professionals discuss how far we can rely on the use of passwords to secure our most valuable information, and how organisations should be securely operating until we can develop... Read More
Overwhelmed and resource-starved app developers are approving vulnerable code and pushing it into live applications in alarming numbers, according to a new research report. Read More
The technology sector has played an instrumental role in enabling society to continue to function digitally – from software developers to cyber security professionals. Read More
Give your cybersecurity culture a boost by adding these to the "don't" column of your cybersecurity awareness training do's and don'ts list. Read More
Spring is here, and after a year filled with record-setting digital transformation and its associated vulnerabilities, now is the right time to give the open source components in your codebase a refresh Read More
Expert discusses the importance of keeping internal computer credentials as safe as your passwords. The need for security never goes away. Read More
To help get a handle on passwords, security experts have chimed in to share their perspectives and opinions with VMblog readers. Read More
Carsten Huth, Technical Account Manager Team Leader, at the application software security and managed services firm Checkmarx, writes of cloud-native security. Read More