Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Checkmarx

Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world's developers while giving CISOs the confidence and control they need. As the AppSec testing leader, we provide the industry's most comprehensive solutions, giving development and security teams unparalleled accuracy, coverage, visibility, and guidance to reduce risk across all components of modern software — including proprietary code, open source, APIs, and Infrastructure as code. Over 1,600 customers, including half of the Fortune 50, trust our security technology, expert research, and global services to securely optimize development at speed and scale. For more information, visit our website, check out our blog, or follow us on LinkedIn.

Our Website: http://www.checkmarx.com/


Latest Content From Checkmarx

Webcast: How Security Vulnerabilities Are Introduced In the Application Development Process – And How to Stop It

by CheckmarxOct 12, 2021

Every day, enterprises deploy application code that contains critical security vulnerabilities – because those flaws went overlooked or unrecognized by the application development team. How do these vulnerabilities escape the development process?  In this Dark Reading webinar, top application security experts outline some of the most commonly-occurring vulnerabilities and offer insight on how and why these flaws are introduced during software development. Attendees will learn about tools and practices for eliminating these vulnerabilities, and receive advice and recommendations on how to improve the development process to find and fix application security flaws – before the code is deployed.


E-Book: 5 Reasons to Prioritize Software Security

by CheckmarxOct 06, 2021

The pace of digital transformation has reached a speed never before seen, forcing organizations into an "adapt or die" situation. Software is at the center of it all, placing increased pressure on DevOps leaders, AppSec managers, and developers to develop and deploy software faster to keep their organizations digitally competitive and relevant.

However, this need for speed comes at a price, as security often falls by the wayside. As the proliferation of software continues, bringing with it an ever-expanding attack surface that's ripe for targeting by malicious actors, securing software must be a priority above all else.


E-Book: An Integrated Approach to Embedding Security into DevOps

by CheckmarxOct 06, 2021

When software is everywhere, everything becomes an attack surface.

The root cause of many successful cyberattacks lies primarily in vulnerable software itself. The real question that needs to be asked is, "Can the industry do a better job of writing more-secure code, making software applications nearly impenetrable to cyberattacks?" Here at Checkmarx we believe the answer is yes. Checkmarx is dedicated to building software security solutions that address the root cause of nearly every successful cyberattack by finding, classifying, reporting, and demonstrating where and how to fix vulnerabilities in software.


Whitepaper: The Application Security Testing Imperative

by CheckmarxOct 06, 2021

This paper provides practical guidance for CISOs, CIOs, and DevOps leaders for designing an effective application security program to secure modern application development via an integrated approach. The paper also aims to equip application security practitioners with research data to support building the business case for AST investments.

In this White Paper, readers will learn:

  • The Implications of Deadline-driven Decisions
  • The Open Source Software Dilemma
  • Demystifying DevSecOps
  • Critical Success Factors for an Effective AST Program
  • Requirements for an Integrated Approach to AST
  • The Bigger Truth


Whitepaper: Checkmarx AppSec Awareness Solution (Codebashing)

by CheckmarxOct 06, 2021

Raising AppSec awareness shouldn't be thought of as a distinct step in the SDLC. It's all about inserting awareness into every step of the SDLC in a manner that actually fuels faster releases. CxCodebashing was designed specifically for this reason. Through the use of open communication, ongoing engagement, gamified training, and on-the-spot remediation support, security managers can cultivate a culture that empowers developers to think and act securely in their day-to-day work.


E-Book: A Quick Intro to Go Language Security Topics

by CheckmarxFeb 17, 2021

Are you new to the Go language (Golang), or are you an old-schooler who just wants a single resource highlighting all the security advantages of Go? You've come to the right place!

To help you quickly increase your knowledge of Go security in general, we've compiled this short summary of security topics you should be aware of when using Go. If you're ready to learn more... Let's Go!

This is a summary of the extended work found in The Go Language Guide — Web Application Secure Coding Practices.


E-Book: Nucleus Research: European Financial Services Institution ROI Case Study

by CheckmarxFeb 17, 2021

One of the largest European financial services institutions did not have a solution to address security vulnerabilities in their custom code. Falling under strict legal and industry standards for security and compliance, the organization considered manual approaches to address the security challenges they faced. However, they quickly realized they needed an integrated and automated way of improving the security of their custom code and looked to Checkmarx to remedy their situation.

As a result, the organization realized a 393 percent ROI and will recover its initial investment in less than five months after implementation.

This report takes a deep dive into how once Checkmarx Codebashing and SAST solutions were implemented, the organization realized a wide range of benefits including:

  • Increased employee productivity
  • Savings from reduced vulnerabilities
  • Scalability in growing environment


E-Book: Open Source Security: The Ultimate Guide to Software Composition Analysis

by CheckmarxFeb 17, 2021

Open source software has facilitated the rapid evolution of application development and shortened development cycles. As with any new advancement in technology, there can be risks associated with open source components which organizations must identify, prioritize, and address. Security vulnerabilities can leave sensitive data exposed to a breach, complex license requirements can jeopardize your intellectual property, and outdated open source libraries can place unnecessary support and maintenance burdens on your development teams.

Today, organizations need deep insight into open source security vulnerabilities affecting their software, with risk severity metrics, detailed vulnerability descriptions, and remediation guidance to mitigate the risk of exploitation.

This eBook is designed to help organizations, management teams, security practitioners, and developers understand Software Composition Analysis (SCA) in depth.


Research Report: Top 10 Security Technology Trends to Watch, 2020

by CheckmarxNov 19, 2020

Application security tools' integration with the CI/CD pipeline is No. 1 of the top 10 security technology trends Forrester expects will shape the security technology landscape in 2020.

Read this report to learn:

  • How integration and automation of application security testing mitigates process gaps;
  • What you should do about it now; and
  • The other top security and risk technology trends you should be watching.


Research Report: Meetup Vulnerabilities: Escalation of Privilege and Redirection of Funds

by CheckmarxOct 05, 2020

Recently, the Checkmarx Security Research Team was looking for API security issues in high-profile web applications, including Meetup.com.

In this report you will learn in detail about:

  • The API issues found
  • The serious cross-site scripting (XSS) and cross-site request forgery (CSRF) vulnerabilities
  • How these vulnerabilities together could put users at risk