Power to the Players: 3 Tips for Gamifying Your Cybersecurity Training

It’s no hidden secret that an increased level of training and education is both one of the biggest needs and shortcomings in the cybersecurity industry. Organizations are falling victim to cyberattacks more frequently than ever before and the ram… Continue reading Power to the Players: 3 Tips for Gamifying Your Cybersecurity Training

The Open Source Cookbook: Prepping Your Kitchen

Over the course of this adventure into the culinary world of software development, we have drawn comparisons between open source software and cookie recipes, and equated open source risks to spoiled ingredients. When cooking, it’s imperative that… Continue reading The Open Source Cookbook: Prepping Your Kitchen

Kotlin Guide: Why We Need Mobile Application Secure Coding Practices

October is the annual National Cybersecurity Awareness Month (NCSAM), which is promoted by the U.S. Department of Homeland Security and the National Initiative for Cybersecurity Careers and Studies (NICCS). According to the NICCS, “Held every Oct… Continue reading Kotlin Guide: Why We Need Mobile Application Secure Coding Practices

Becoming Optimus Prime Within Your AppSec Initiatives

When I was a child, I didn’t dream of becoming a legendary football player or a rock star. My dream was to become a Transformer: specifically Optimus Prime. I am sure some of you in the audience shared the same dream. As you can probably guess, u… Continue reading Becoming Optimus Prime Within Your AppSec Initiatives

Why Software Security and DevOps Were the Talk of the Town at Black Hat and DEF CON 2019

In the wake of Black Hat 2019 and DEF CON 27, there is no doubt that the cybersecurity industry is growing beyond anyone’s expectations. The sheer number of sponsors and attendees who descended upon Las Vegas last week from all parts of the world… Continue reading Why Software Security and DevOps Were the Talk of the Town at Black Hat and DEF CON 2019

One Common Theme – One Common Goal

On the heels of the RSA Asia Pacific and Japan conference that took place last week, there was one common theme that Checkmarx captured while speaking with visitors at their stand—imbedding security throughout an organizations’ DevOps ecosy… Continue reading One Common Theme – One Common Goal

Houston [I mean Bulgaria], we’ve got a problem

Every relationship is built on trust. Trust is at the core of every lasting relationship, whether it’s between family members, between spouses, between organizations and their customers, and even between citizens and their government. At the star… Continue reading Houston [I mean Bulgaria], we’ve got a problem

Code Exposure: The Vulnerabilities in Your Code & Where They Originate

Code Exposure: The Vulnerabilities in Your Code & Where They Originate Typical software applications are comprised of two types of code: custom code created by your internal development teams, and third-party code – often open source – … Continue reading Code Exposure: The Vulnerabilities in Your Code & Where They Originate

Talking Cloud Technology is Yesterday’s News

Talking Cloud Technology is Yesterday’s News The other day I was on the phone with a colleague, discussing market trends of cloud computing. With me in the room was my 55-year old uncle, who heard bits of our conversation. After the call, he aske… Continue reading Talking Cloud Technology is Yesterday’s News

Checkmarx Named a June 2019 Gartner Peer Insights Customers’ Choice for Application Security Testing

Customer feedback is critically important in delivering security solutions that address modern business challenges while enabling key digital-transformation initiatives. It also provides the real-world insights other organizations need when making impo… Continue reading Checkmarx Named a June 2019 Gartner Peer Insights Customers’ Choice for Application Security Testing