Skip to content

In the News

Featured

04/25/2024

5 ways Runtime Security cuts through exploding software complexity

Software complexity is exploding. Modern applications and application programming interfaces (APIs) comprise hundreds of repositories, frameworks, components, platforms, containers, services and connections. The rapidly increasing use of third-party, open-source libraries and AI-generated code is aggravating the challenge.

Read More
5 ways Runtime Security cuts through exploding software complexity

03/13/2024

Gartner outlines top cybersecurity trends — and (spoiler alert) AI is No. 1

Here are the top security trends of the year — and what your team needs to know about them. AI, for one, has its pros and cons for your security posture.

Read More arrow-right-tertiary

03/08/2024

Microsoft says it hasn’t been able to shake Russian state hackers

BOSTON (AP) — Microsoft said Friday it’s still trying to evict the elite Russian government hackers who broke into the email accounts of senior company executives in November and who it said have been trying to breach customer networks with stolen access data.

Read More arrow-right-tertiary

03/04/2024

Experts Warn of Risks in Memory-Safe Programming Overhauls

Recent guidance published by the Office of the National Cyber Director recommends software manufacturers universally adopt memory-safe programming languages, but experts told Information Security Media Group that costly overhauls of existing software into memory-safe languages could pose new security risks.

Read More arrow-right-tertiary

03/01/2024

How Can You Avoid Card Skimmers?

Stay safe by knowing how credit card skimmers work and what they look like.

 
 
Read More arrow-right-tertiary

02/29/2024

ConnectWise ScreenConnect Vulnerabilities: What CIOs Need to Know

Two vulnerabilities in the remote desktop management software are being exploited in the wild.

Read More arrow-right-tertiary

02/27/2024

Cybercrims: When we hit IT, they sometimes pay, but when we hit OT... jackpot

Or so says opsec firm, which confirms 70% of all industrial org ransomware in 2023 targeted manufacturers

Read More arrow-right-tertiary

02/09/2024

How to use Runtime Security to protect risks to both APIs and legacy COTS

The days when you could take your time addressing code vulnerabilities are gone.

Read More arrow-right-tertiary

12/21/2023

MLflow vulnerability enables remote machine learning model theft and poisoning

Patched in the latest version of MLflow, the flaw allows attackers to steal or poison sensitive training data when a developer visits a random website on the internet.

 

 
Read More arrow-right-tertiary

12/06/2023

What should be in a company-wide policy on low-code/no-code development

Low-code/no-code development could bridge the gulf of development backlogs that exists between great ideas and great execution of digital innovation. But not without security policies around areas like access control, code quality, and application visibility.

Read More arrow-right-tertiary

11/30/2023

Okta Discloses Wide-Ranging Impact of October 2023 System Breach

A popular identity management tool, Okta, has disclosed that a recent system breach had a wider impact than previously known. In the initial report of the breach in October 2023, the company stated that around 1% of its users were impacted. However, Okta has now stated that the attack impacted all its customers.

Read More arrow-right-tertiary

11/28/2023

Ukraine claims Russia's planes in peril as sanctions bite

Aeroflot fleet still has a smoking section, but not for tobacco

Read More arrow-right-tertiary

11/27/2023

General Electric, DARPA Hack Claims Raise National Security Concerns

Weapons systems data, AI research, and other classified information may be up for sale, not to mention access to other government agencies.

Read More arrow-right-tertiary

Experience Contrast today

See how you could get secure code moving on the Contrast Secure Code Platform