Power to the Players: 3 Tips for Gamifying Your Cybersecurity Training

It’s no hidden secret that an increased level of training and education is both one of the biggest needs and shortcomings in the cybersecurity industry. Organizations are falling victim to cyberattacks more frequently than ever before and the ram… Continue reading Power to the Players: 3 Tips for Gamifying Your Cybersecurity Training

The Open Source Cookbook: Prepping Your Kitchen

Over the course of this adventure into the culinary world of software development, we have drawn comparisons between open source software and cookie recipes, and equated open source risks to spoiled ingredients. When cooking, it’s imperative that… Continue reading The Open Source Cookbook: Prepping Your Kitchen

Kotlin Guide: Why We Need Mobile Application Secure Coding Practices

October is the annual National Cybersecurity Awareness Month (NCSAM), which is promoted by the U.S. Department of Homeland Security and the National Initiative for Cybersecurity Careers and Studies (NICCS). According to the NICCS, “Held every Oct… Continue reading Kotlin Guide: Why We Need Mobile Application Secure Coding Practices

Becoming Optimus Prime Within Your AppSec Initiatives

When I was a child, I didn’t dream of becoming a legendary football player or a rock star. My dream was to become a Transformer: specifically Optimus Prime. I am sure some of you in the audience shared the same dream. As you can probably guess, u… Continue reading Becoming Optimus Prime Within Your AppSec Initiatives

9 Key Players for a Winning Security Team

Basketball legend Michael Jordan once said, “Talent wins games, but teamwork and intelligence win championships.” When it comes to something as important as your company’s security, you can’t afford to rely on anything less than… Continue reading 9 Key Players for a Winning Security Team

Don’t Get Phished – 7 Tips to Avoid This Common Cyber Attack

Phishing is the most common type of cyber-attack that impacts organizations both large and small. These attacks may take many forms, but they all share a common goal – getting you to share sensitive information such as login credentials, credit c… Continue reading Don’t Get Phished – 7 Tips to Avoid This Common Cyber Attack

Top 5 OWASP Resources No Developer Should Be Without

Writing secure code is now a must for developers. The rising number of attacks on organizations big and small and […]
The post Top 5 OWASP Resources No Developer Should Be Without appeared first on Checkmarx.
The post Top 5 OWASP Resources No Dev… Continue reading Top 5 OWASP Resources No Developer Should Be Without

A Closer Look: OWASP Top 10 2017 – Application Security Risks

Open Web Application Security Project (OWASP) is an organization filled with security experts from around the world who provide information […]
The post A Closer Look: OWASP Top 10 2017 – Application Security Risks appeared first on Checkma… Continue reading A Closer Look: OWASP Top 10 2017 – Application Security Risks