In the News
Featured
04/25/2024
5 ways Runtime Security cuts through exploding software complexity
Software complexity is exploding. Modern applications and application programming interfaces (APIs) comprise hundreds of repositories, frameworks, components, platforms, containers, services and connections. The rapidly increasing use of third-party, open-source libraries and AI-generated code is aggravating the challenge.
03/13/2024
Gartner outlines top cybersecurity trends — and (spoiler alert) AI is No. 1
Here are the top security trends of the year — and what your team needs to know about them. AI, for one, has its pros and cons for your security posture.
03/08/2024
Microsoft says it hasn’t been able to shake Russian state hackers
BOSTON (AP) — Microsoft said Friday it’s still trying to evict the elite Russian government hackers who broke into the email accounts of senior company executives in November and who it said have been trying to breach customer networks with stolen access data.
03/04/2024
Experts Warn of Risks in Memory-Safe Programming Overhauls
Recent guidance published by the Office of the National Cyber Director recommends software manufacturers universally adopt memory-safe programming languages, but experts told Information Security Media Group that costly overhauls of existing software into memory-safe languages could pose new security risks.
03/01/2024
How Can You Avoid Card Skimmers?
Stay safe by knowing how credit card skimmers work and what they look like.
02/29/2024
ConnectWise ScreenConnect Vulnerabilities: What CIOs Need to Know
Two vulnerabilities in the remote desktop management software are being exploited in the wild.
02/27/2024
Cybercrims: When we hit IT, they sometimes pay, but when we hit OT... jackpot
Or so says opsec firm, which confirms 70% of all industrial org ransomware in 2023 targeted manufacturers
02/09/2024
How to use Runtime Security to protect risks to both APIs and legacy COTS
The days when you could take your time addressing code vulnerabilities are gone.
12/21/2023
MLflow vulnerability enables remote machine learning model theft and poisoning
Patched in the latest version of MLflow, the flaw allows attackers to steal or poison sensitive training data when a developer visits a random website on the internet.
12/06/2023
What should be in a company-wide policy on low-code/no-code development
Low-code/no-code development could bridge the gulf of development backlogs that exists between great ideas and great execution of digital innovation. But not without security policies around areas like access control, code quality, and application visibility.
11/30/2023
Okta Discloses Wide-Ranging Impact of October 2023 System Breach
A popular identity management tool, Okta, has disclosed that a recent system breach had a wider impact than previously known. In the initial report of the breach in October 2023, the company stated that around 1% of its users were impacted. However, Okta has now stated that the attack impacted all its customers.
11/28/2023
Ukraine claims Russia's planes in peril as sanctions bite
Aeroflot fleet still has a smoking section, but not for tobacco
11/27/2023
General Electric, DARPA Hack Claims Raise National Security Concerns
Weapons systems data, AI research, and other classified information may be up for sale, not to mention access to other government agencies.
Experience Contrast today
See how you could get secure code moving on the Contrast Secure Code Platform