Skip to content

In the News

Featured

04/25/2024

5 ways Runtime Security cuts through exploding software complexity

Software complexity is exploding. Modern applications and application programming interfaces (APIs) comprise hundreds of repositories, frameworks, components, platforms, containers, services and connections. The rapidly increasing use of third-party, open-source libraries and AI-generated code is aggravating the challenge.

Read More
5 ways Runtime Security cuts through exploding software complexity

07/07/2023

How to protect your organization from software APIs that can either drive or ruin business success

Rapidly changing application programming interfaces (APIs) make ripe targets for attackers, and organizations need new security practices to defend themselves.

Read More arrow-right-tertiary

07/06/2023

Data Loss Prevention for Financial Services in 2023

The financial services industry has its unique set of data security challenges.

Read More arrow-right-tertiary

07/05/2023

Episode 126: Unleashing the Power of AI in Product Management and Cybersecurity with Steve Wilson, Chief Product Officer at Contrast Security

In this episode of Product Thinking, Steve Wilson, Chief Product Officer at Contrast Security, joins Melissa Perr.

Read More arrow-right-tertiary

07/04/2023

Federal Network Devices Across Multiple Agencies Violate CISA’s Security Requirements

Security researchers have discovered hundreds of federal network devices.

Read More arrow-right-tertiary

07/02/2023

Idea of separate US Cyber Force raises eyebrows

The prospect of an independent Cyber Force within the US military might be assessed in Washington soon. 

Read More arrow-right-tertiary

06/29/2023

CISA working with agencies to pull exposed network tools from public internet

The Cybersecurity and Infrastructure Security Agency (CISA).

Read More arrow-right-tertiary

06/28/2023

What is Cyberwar?

Ask any three people to define cyberwar and you will get three different answers.

Read More arrow-right-tertiary

06/28/2023

Hundreds of FCEB Devices Are Violating CISA’s Latest Directive

FCEB agencies have 14 days to comply with 23-02 BOD either by securing it with Zero Trust Architecture or removing the device from the public internet.

Read More arrow-right-tertiary

06/20/2023

Russia’s ‘Fancy Bear’ hackers targeted Ukrainian gov’t, military orgs

Hackers with an infamous Russian military cyber group have targeted the Ukrainian government.

Read More arrow-right-tertiary

06/20/2023

OWASP Top 10 for LLMs: Can AI risk be tamed?

Read More arrow-right-tertiary

06/19/2023

Firmware Backdoor Discovered in Gigabyte Motherboards, Hundreds of Models Affected

Research from supply chain security firm Eclypsium Labs indicates.

Read More arrow-right-tertiary

06/16/2023

MOVEit Vulnerabilities: Clop Ransomware Gang Victims Keep Increasing

Experts criticized MOVEit MFT developer Ipswitch and found it “alarming” that the company missed an SQL injections flaw.

Read More arrow-right-tertiary

Experience Contrast today

Schedule a one-to-one demo to see what Contrast Runtime Security can do for you