Skip to content

In the News

Featured

04/25/2024

5 ways Runtime Security cuts through exploding software complexity

Software complexity is exploding. Modern applications and application programming interfaces (APIs) comprise hundreds of repositories, frameworks, components, platforms, containers, services and connections. The rapidly increasing use of third-party, open-source libraries and AI-generated code is aggravating the challenge.

Read More
5 ways Runtime Security cuts through exploding software complexity

04/25/2024

5 ways Runtime Security cuts through exploding software complexity

Software complexity is exploding. Modern applications and application programming interfaces (APIs) comprise hundreds of repositories, frameworks, components, platforms, containers, services and connections. The rapidly increasing use of third-party, open-source libraries and AI-generated code is aggravating the challenge.

Read More arrow-right-tertiary

04/24/2024

Vintage Microsoft flaw resurfaces, threat actors attack with golden GooseEgg

State-linked actors are using a custom tool for post exploitation activity of a vulnerability in Windows Print Spooler, which could result in credential theft and backdoor installs.

Read More arrow-right-tertiary

04/24/2024

People on the Move

Contrast Security, a company specializing in runtime and application security, has appointed Shay Mowlem as Chief Marketing Officer (CMO). Prior to Contrast, Mowlem held executive marketing and product roles at NinjaOne, Illumio, Rubrik, MuleSoft and Splunk.

 

Read More arrow-right-tertiary

04/23/2024

State-Sponsored Russian Hackers Linked to Breach of Texas Water Treatment Plant

Leading cybersecurity firm Mandiant believes that a notorious group of Russian hackers is behind a recent rash of attacks on water utilities in several countries, including the United States. On January 18 the group was able to induce a tank overflow at a Texas water treatment plant, and has made similar incursions in France and Poland.

Read More arrow-right-tertiary

04/23/2024

Contrast Security Welcomes Shay Mowlem as Chief Marketing Officer to Drive Global Expansion

Contrast Security announces the appointment of Shay Mowlem as Chief Marketing Officer (CMO), tasked with leading the company's global marketing endeavors. With a focus on Contrast's groundbreaking Runtime Security platform, Mowlem brings a wealth of experience from esteemed enterprise software companies, setting the stage for heightened strategic direction and accelerated growth.

Read More arrow-right-tertiary

04/23/2024

Leveraging AI to Bolster Cloud Security for APIs and Microservices

Runtime Application Self-Protection (RASP): Employing Runtime Application Self-Protection (RASP) solutions like Contrast Security or Veracode involves embedding security policies into API runtime environments to enforce measures against common threats like injection attacks and data exposure.  

Read More arrow-right-tertiary

04/18/2024

OWASP looks to future-proof SBOMs with CycloneDX 1.6

The foundation is upgrading the standard for the quantum era, adding ML-readable attestation and more. Here's how it boosts software supply chain security.

 
Read More arrow-right-tertiary

04/12/2024

ISC2 study pegs average US cybersecurity salary at $147K, up from $119K in 2021

Gender and ethnicity gaps persist, but female executives and middle managers earned more on average than male counterparts, according to the survey.

Read More arrow-right-tertiary

04/11/2024

How MSSPs, MSPs Can Help Defend the Water Supply

It’s hard to imagine a cyberattack on critical infrastructure target any more disastrous and cruel than to a source of drinking water. Yet, the White House says there is now evidence that state-sponsored threat actors are doing just that.

Read More arrow-right-tertiary

04/11/2024

Will There Ever Be a Solution to Zero-Day Exploits? Expert Analysis

Pushed by the rapid acceleration and abundance of new software, updates, and apps being released, the software development sector is leaving wide security gaps and weak points across architectures.

Read More arrow-right-tertiary

04/09/2024

DOJ data on 341,000 people leaked in cyberattack on consulting firm

A cyberattack on a consulting firm working for the U.S. Department of Justice resulted in the theft of personal and medical data belonging to more than 340,000 individuals.

Read More arrow-right-tertiary

04/09/2024

When GenAI and low-code collide: What could go wrong for AppSec?

Here's why the duo results in a perfect storm, key considerations — and expert advice on how engineering and application security teams can tackle the problem.

Read More arrow-right-tertiary

Experience Contrast today

See how you could get secure code moving on the Contrast Secure Code Platform