unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Cloud Native Application Security: Best Practices for Code to Cloud Security
ByEditor...
2024-2-20 21:52:18 | 阅读: 12 |
收藏
|
Checkmarx.com - checkmarx.com
security
cloud
threats
evolving
development
2024 API Risk Management: Secure Your APIs in Cloud-Native World
ByEditor...
2024-2-19 20:43:56 | 阅读: 22 |
收藏
|
Checkmarx.com - checkmarx.com
security
developers
software
cloud
Open Source vs. Premium SAST Tools: True Costs of “Good enough” static code analysis tools
ByEditor...
2024-2-19 19:58:0 | 阅读: 25 |
收藏
|
Checkmarx.com - checkmarx.com
security
premium
appsec
workflows
API Management Best Practice: Automated API Security Testing
ByEditor...
2024-2-19 18:34:28 | 阅读: 23 |
收藏
|
Checkmarx.com - checkmarx.com
security
developers
checkmarx
lifecycle
Shadow & Zombie APIs: The Undocumented API Vulnerabilities Threaten Security Posture
ByEditor...
2024-2-19 17:3:7 | 阅读: 11 |
收藏
|
Checkmarx.com - checkmarx.com
security
shadow
zombie
developers
checkmarx
Boost Your Security Posture: 5 Steps to Effective Static Source Code Analysis
By Editor mins read 3:50 Why Static Source Code Security Analysis is I...
2024-2-19 16:50:22 | 阅读: 17 |
收藏
|
Checkmarx.com - checkmarx.com
security
presets
developers
development
Shift-Left Security: Integrate SAST into DevSecOps Pipeline
By Editor mins read 12:12 Why SAST And DevSecOps Go Together The...
2024-2-19 01:12:48 | 阅读: 10 |
收藏
|
Checkmarx.com - checkmarx.com
security
development
analysis
sdlc
From Lines of Code to Cloud Security: Navigating the Future of Secure Development
By Sagy Kratu February 14, 2024 Whether it’s castle walls or firewalls...
2024-2-14 20:0:0 | 阅读: 10 |
收藏
|
Checkmarx.com - checkmarx.com
security
cloud
sagy
checkmarx
kratu
You Can Have It All: Speed & Security – Introducing Our New SAST Engine
Checkmarx is a pioneer and leader in the Application Security space. Our commitment to our customer...
2024-2-12 20:0:0 | 阅读: 25 |
收藏
|
Checkmarx.com - checkmarx.com
security
checkmarx
development
developers
fidelity
Checkmarx Introduces Next-generation Enterprise SAST Engine Offering Both Maximum Risk Reduction and Ultra-fast Scanning
Security teams can now scan applications up to 90% faster and simplify prioritization by reducing f...
2024-2-12 19:59:38 | 阅读: 13 |
收藏
|
Checkmarx.com - checkmarx.com
security
checkmarx
development
developers
positives
The Hidden Dangers of Abandoned Digital Assets in Open-Source Ecosystems
The digital ocean on which many of us including the world's largest corporations rely on, is fi...
2024-2-8 20:0:0 | 阅读: 15 |
收藏
|
Checkmarx.com - checkmarx.com
abandoned
attackers
hijacking
malicious
hijacked
Preparing for Europe’s Most Extensive Cybersecurity Directive, NIS2 – What AppSec teams need to know
By Carsten Huth February 7, 2024 Regulations are constantly evolving,...
2024-2-7 15:0:0 | 阅读: 9 |
收藏
|
Checkmarx.com - checkmarx.com
appsec
nis2
carsten
security
checkmarx
Zack Bentolila of Checkmarx Recognized as 2024 CRN® Channel Chief
PARAMUS, N.J. – FEBRUARY 6, 2024 – Checkmarx, the leader in cloud-native application security, anno...
2024-2-7 02:22:33 | 阅读: 5 |
收藏
|
Checkmarx.com - checkmarx.com
checkmarx
crn
appsec
cloud
bentolila
Container runtime insights to prioritize what matters most
Through an integration with Sysdig, Checkmarx One users can now leverage runtime container insights...
2024-2-6 20:0:0 | 阅读: 16 |
收藏
|
Checkmarx.com - checkmarx.com
checkmarx
security
sysdig
prioritize
Navigating the Rising Tide of CI/CD Vulnerabilities: The Jenkins and TeamCity Case Studies
In the evolving landscape of cybersecurity, a new threat has emerged, targeting the core of softwar...
2024-2-6 13:0:0 | 阅读: 22 |
收藏
|
Checkmarx.com - checkmarx.com
software
security
threats
jenkins
teamcity
How AI Enables More Effective Static Application Security Testing
By Checkmarx Admin mins read 9:02 Artificial Intelligence In Static A...
2024-2-4 22:2:46 | 阅读: 12 |
收藏
|
Checkmarx.com - checkmarx.com
security
analysis
identify
weaknesses
How AI Enables More Effective Static Application Security Testing
By Checkmarx Admin mins read 9:02 Artificial Intelligence In Static A...
2024-2-4 22:2:46 | 阅读: 16 |
收藏
|
Checkmarx.com - checkmarx.com
security
analysis
weaknesses
identify
How We Were Able to Infiltrate Attacker Telegram Bots
Key Points Attackers often utilize Telegram bots to extract victims' data. Monitoring an attacker'...
2024-2-2 04:5:10 | 阅读: 22 |
收藏
|
Checkmarx.com - checkmarx.com
attacker
bots
attackers
malicious
webhook
What You Need To Know About NIST 800-218: The Secure Software Development Framework
By John Allison January 31, 2024 With the introduction of the National...
2024-1-31 22:0:0 | 阅读: 16 |
收藏
|
Checkmarx.com - checkmarx.com
software
security
pw
development
Checkmarx’ Approach to Software Supply Chain Security
2023 culminated with an intensified wave of attacks on the software supply chain. Here are just a f...
2024-1-31 20:0:0 | 阅读: 8 |
收藏
|
Checkmarx.com - checkmarx.com
software
security
checkmarx
malicious
Previous
5
6
7
8
9
10
11
12
Next