The IoT within us: Network-connected medical devices

The Internet of Things is all around us. But it doesn’t stop there—now it’s inside us too. As the era of “connected everything” explodes, so does the use of network-connected medical devices. These interconnected devices, … Continue reading The IoT within us: Network-connected medical devices

The Intelligent Adaptive Authentication Workflow

Adaptive authentication represents the cutting-edge of authentication technology, and Intelligent Adaptive Authentication (IAA) sits at the forefront. It allows financial institutions (FIs) to break the balancing act between mitigating fraud and encou… Continue reading The Intelligent Adaptive Authentication Workflow

Wading through the alphabet soup of application security testing tools: A guide to SAST, IAST, DAST, and RASP

Every application security testing tool has advantages and disadvantages. No single solution can ensure you find and fix all vulnerabilities. But application security tools can complement one another and help you secure your applications in each stage … Continue reading Wading through the alphabet soup of application security testing tools: A guide to SAST, IAST, DAST, and RASP

Infographic: PCI Compliance and GDPR

The May 25 deadline for compliance with the EU’s General Data Protection Regulation (GDPR) is swiftly approaching, which for some means anxiety levels are at an all-time high. With GDPR also comes mandatory compliance with PCI DSS 3.2. Is your co… Continue reading Infographic: PCI Compliance and GDPR

Research Uncovers the Hidden Costs of Detection-based Cybersecurity [Infographic]

Our new research conducted by Vanson Bourne finds detect-to-protect security costs organizations more than $16 million per year. This is despite the fact that detection-based cybersecurity is failing to keep up with increasingly sophisticated malware. … Continue reading Research Uncovers the Hidden Costs of Detection-based Cybersecurity [Infographic]

November 2017: Top Hacks and Breaches [INFOGRAPHIC]

Recent research confirms that a third of the internet is under attack, with millions of network addresses subjected to DDoS […]
The post November 2017: Top Hacks and Breaches [INFOGRAPHIC] appeared first on Checkmarx.
The post November 2017: Top … Continue reading November 2017: Top Hacks and Breaches [INFOGRAPHIC]