Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world's developers while giving CISOs the confidence and control they need. As the AppSec testing leader, we provide the industry's most comprehensive solutions, giving development and security teams unparalleled accuracy, coverage, visibility, and guidance to reduce risk across all components of modern software — including proprietary code, open source, APIs, and infrastructure as code. Over 1,600 customers, including half of the Fortune 50, trust our security technology, expert research, and global services to securely optimize development at speed and scale. For more information, visit our website, check out our blog, or follow us on LinkedIn.

Our Website:

Latest Content From Checkmarx

Infographic: 2021 Global DevOps Secure Coding Education Survey

by CheckmarxOct 06, 2021

To understand the challenges today's developers are facing, we commissioned our 2021 Global DevOps Secure Coding Education Survey. We engaged a third-party research firm to interview over 800 developers around the world to understand their thoughts and views on the security education techniques being used both now and in the future.

Survey report highlights include:

  • Less than 3 in 10 Global Developers are completely confident that their code is secure.
  • Less than 25% of Global Developers feel that the secure coding education they're currently receiving is adequate.
  • 81% of Global Developers know that creating secure code is a shared responsibility.
  • Nearly two-thirds of Global Developers want interactive secure coding education
Take a look at the infographic report summary and you'll see why CxCodebashing, our snackable, gamified, just-in-time AppSec training platform, along with CxSAST and the rest of the integrated Checkmarx security solutions are the way forward to seamlessly create groundbreaking secure code for an increasingly complex world.

E-Book: 5 Reasons to Prioritize Software Security

by CheckmarxOct 06, 2021

The pace of digital transformation has reached a speed never before seen, forcing organizations into an "adapt or die" situation. Software is at the center of it all, placing increased pressure on DevOps leaders, AppSec managers, and developers to develop and deploy software faster to keep their organizations digitally competitive and relevant.

However, this need for speed comes at a price, as security often falls by the wayside. As the proliferation of software continues, bringing with it an ever-expanding attack surface that's ripe for targeting by malicious actors, securing software must be a priority above all else.

E-Book: A Quick Intro to Go Language Security Topics

by CheckmarxFeb 17, 2021

Are you new to the Go language (Golang), or are you an old-schooler who just wants a single resource highlighting all the security advantages of Go? You've come to the right place!

To help you quickly increase your knowledge of Go security in general, we've compiled this short summary of security topics you should be aware of when using Go. If you're ready to learn more... Let's Go!

This is a summary of the extended work found in The Go Language Guide — Web Application Secure Coding Practices.

E-Book: An Integrated Approach to Embedding Security into DevOps

by CheckmarxOct 06, 2021

When software is everywhere, everything becomes an attack surface.

The root cause of many successful cyberattacks lies primarily in vulnerable software itself. The real question that needs to be asked is, "Can the industry do a better job of writing more-secure code, making software applications nearly impenetrable to cyberattacks?" Here at Checkmarx we believe the answer is yes. Checkmarx is dedicated to building software security solutions that address the root cause of nearly every successful cyberattack by finding, classifying, reporting, and demonstrating where and how to fix vulnerabilities in software.

E-Book: AppSec Considerations For Modern Application Development

by CheckmarxOct 17, 2022

AppSec Considerations For Modern Application Development (MAD)

What are the Application Security considerations for MAD that organizations need to be mindful of and learn about best practices to managing:

  • Applicative code risks
  • Container code risks
  • Infrastructure as code risks
  • Developer AppSec awareness and training
  • AST challenges in MAD

Whitepaper: Checkmarx AppSec Awareness Solution (Codebashing)

by CheckmarxOct 06, 2021

Raising AppSec awareness shouldn't be thought of as a distinct step in the SDLC. It's all about inserting awareness into every step of the SDLC in a manner that actually fuels faster releases. CxCodebashing was designed specifically for this reason. Through the use of open communication, ongoing engagement, gamified training, and on-the-spot remediation support, security managers can cultivate a culture that empowers developers to think and act securely in their day-to-day work.

Research Report: Meetup Vulnerabilities: Escalation of Privilege and Redirection of Funds

by CheckmarxOct 05, 2020

Recently, the Checkmarx Security Research Team was looking for API security issues in high-profile web applications, including

In this report you will learn in detail about:

  • The API issues found
  • The serious cross-site scripting (XSS) and cross-site request forgery (CSRF) vulnerabilities
  • How these vulnerabilities together could put users at risk

E-Book: Nucleus Research: European Financial Services Institution ROI Case Study

by CheckmarxFeb 17, 2021

One of the largest European financial services institutions did not have a solution to address security vulnerabilities in their custom code. Falling under strict legal and industry standards for security and compliance, the organization considered manual approaches to address the security challenges they faced. However, they quickly realized they needed an integrated and automated way of improving the security of their custom code and looked to Checkmarx to remedy their situation.

As a result, the organization realized a 393 percent ROI and will recover its initial investment in less than five months after implementation.

This report takes a deep dive into how once Checkmarx Codebashing and SAST solutions were implemented, the organization realized a wide range of benefits including:

  • Increased employee productivity
  • Savings from reduced vulnerabilities
  • Scalability in growing environment

E-Book: Open Source Security: The Ultimate Guide to Software Composition Analysis

by CheckmarxFeb 17, 2021

Open source software has facilitated the rapid evolution of application development and shortened development cycles. As with any new advancement in technology, there can be risks associated with open source components which organizations must identify, prioritize, and address. Security vulnerabilities can leave sensitive data exposed to a breach, complex license requirements can jeopardize your intellectual property, and outdated open source libraries can place unnecessary support and maintenance burdens on your development teams.

Today, organizations need deep insight into open source security vulnerabilities affecting their software, with risk severity metrics, detailed vulnerability descriptions, and remediation guidance to mitigate the risk of exploitation.

This eBook is designed to help organizations, management teams, security practitioners, and developers understand Software Composition Analysis (SCA) in depth.

Whitepaper: The Application Security Testing Imperative

by CheckmarxOct 06, 2021

This paper provides practical guidance for CISOs, CIOs, and DevOps leaders for designing an effective application security program to secure modern application development via an integrated approach. The paper also aims to equip application security practitioners with research data to support building the business case for AST investments.

In this White Paper, readers will learn:

  • The Implications of Deadline-driven Decisions
  • The Open Source Software Dilemma
  • Demystifying DevSecOps
  • Critical Success Factors for an Effective AST Program
  • Requirements for an Integrated Approach to AST
  • The Bigger Truth