Why AppSec Should be a Priority during COVID-19
Latest Blog Posts
CTparental Vulnerabilities Enabled Filter Bypassing
Checkmarx – Making Waves Once Again
Follow Us

How API Use Cases Have Evolved, and What It Means for API Security
APIs are like telephones: they have been around for quite a while, yet they have changed tremendously in recent years.
Checkmarx Launches New Global Partner Program
Empowers partners and distributors to grow and retain customer bases while meeting accelerating demand for AST solutions NEW YORK &

CTparental Vulnerabilities Enabled Filter Bypassing
For those who don’t know me, I am a mother to two brilliant children who are better at the game

Checkmarx – Making Waves Once Again
In organizations that encourage the usage of modern application development techniques to expedite the development, delivery, and deployment of custom
Checkmarx Named a Strong Performer in Software Composition Analysis by Leading Analyst Firm
NEW YORK & RAMAT GAN, ISRAEL – August 18, 2021 – Checkmarx, the global leader in developer-centric application security testing (AST) solutions, today announced

Why Developers Worldwide Benefit from Secure Coding Education
Global Developers think secure coding education can save time and money while adding personal and organizational value. The impact of

Why Centralized Risk Management and Governance Are Key to Modernizing Legacy Applications
A Mandate from Federal Government Today, security is an absolute requirement. The Federal Government knows that security is a critical

The Magic of GitLab’s Templates: What’s New with Checkmarx GitLab Integration
Last year at GitLab Commit, I presented our integration with GitLab to initiate Checkmarx security scans within your GitLab CI/CD
Checkmarx Acquires Software Supply Chain Security Provider, Dustico
Acquisition brings behavioral source code analysis to Checkmarx customers to defend against open source software supply chain attacks RAMAT GAN,

KICS is Exceeding All Expectations
KICS (Keeping Infrastructure as Code Secure) has had an incredibly successful launch with over 273k downloads as of date! As

What’s Lurking Within: Stopping Malicious Actors in Software Supply Chains
What’s Lurking Within? Malicious Code. Supply chain attacks occur when cyberthreat actors insert malicious code into trusted software, creating a

Business Benefits of Buying Your Application Security Solution on AWS Marketplace
The rise of cloud technology has revolutionized the way we think about software and how organizations buy it. Long procurement

Chained RaspAP Vulnerabilities Grant Root Level Access
According to its official documentation, “RaspAP” is a wireless router software for many popular Debian-based devices, including the Raspberry Pi. It

Not All AppSec Scanning Is Created Equal
You no doubt know the phrase, “if you don’t have anything nice to say, don’t say anything at all.” A

Developing Digital Citizen Services: Our Duty to Keep Digital Government Secure
Cybersecurity is top of mind right now as President Biden’s Executive Order sets a new, more urgent tone around the
