Skip to content

In the News

Featured

08/30/2022

State of Application Security – Jeff Williams, Contrast Security

Alan and Jeff discuss the current state and trends of application security as well as the latest news from Contrast Security.

Read More
State of Application Security – Jeff Williams, Contrast Security

09/17/2022

Serious breach at Uber spotlights hacker social deception

The ride-hailing service Uber said Friday.

Read More arrow-right-tertiary

09/16/2022

Factbox: What to do if you were a corporate hack victim

A reported breach of Uber Technologies Inc's (UBER.N)

Read More arrow-right-tertiary

09/16/2022

Uber investigating security breach of several internal systems

Communications and engineering systems were taken offline after hacker sends images of repositories to cybersecurity researchers and The New York Times.

Read More arrow-right-tertiary

09/16/2022

Industry Reactions to Govt Requiring Security Guarantees From Software Vendors

The White House has announced new guidance with the aim of ensuring that federal agencies only use secure software.

Read More arrow-right-tertiary

09/15/2022

White House issues a memorandum on software supply chain security

The White House yesterday issued guidance for Federal agencies’ use of software security practices. 

Read More arrow-right-tertiary

09/15/2022

White House: U.S. agencies have 90 days to create inventory of all software

he White House released new guidance this week ordering federal agencies to create a full inventory of the software they use within 90 days. 

Read More arrow-right-tertiary

09/15/2022

3 Key Resume Tips for iOS Developers Seeking a Job

Submitting a resume is often a nerve-wracking experience. 

Read More arrow-right-tertiary

09/15/2022

White House issues a memorandum on software supply chain security.

The White House yesterday issued guidance for Federal agencies’ use of software security practices. 

Read More arrow-right-tertiary

09/15/2022

Former Conti Ransomware Members, Tools Linked To Initial Access Broker Targeting Ukraine

Five attack campaigns conducted against Ukrainian government agencies and businesses.

Read More arrow-right-tertiary

09/14/2022

Former Conti Ransomware Members, Tools Linked To Initial Access Broker Targeting Ukraine

Five attack campaigns conducted against Ukrainian government agencies and businesses this spring and summer.
Read More arrow-right-tertiary

09/13/2022

Lawsuit after KeyBank breach heralds potential changes in cyber liability

Just days after KeyBank publicly announced late last Friday that an untold number of its mortgage customers had their information stolen.

Read More arrow-right-tertiary

09/12/2022

OpenAPIs and Third-Party Risks

With APIs, details and specifics are vital. Each API usually takes in very specific requests in a very specific format and returns very specific information.

Read More arrow-right-tertiary

Experience Contrast today

See how you could get secure code moving on the Contrast Secure Code Platform