<iframe src="//www.googletagmanager.com/ns.html?id=GTM-WQV6DT" height="0" width="0" style="display:none;visibility:hidden">

SECURITY INFLUENCERS BLOG

Security influencers provide real-world insight and “in-the-trenches” experiences on topics ranging from application security to DevOps and risk management

Contrast News- Thought Leaders

Where the Industrial IoT Vulnerabilities Lurk in Your Plant

Christine Carrig, Director of Marketing | January 9, 2017

When you connect manufacturing machinery to the internet, you've created a potential gateway for hackers to exploit. Here's a look at the risks you might be facing.

Who would have thought a bunch of DVRs could slow down -- and in some cases, bring..

Read More

Contrast News

The 'Exxon Valdez' of Security Breaches

Christine Carrig, Director of Marketing | December 21, 2016

For the second time this year, Yahoo has disclosed a data breach that affected over one billion accounts. Yahoo said that it believes an "unauthorized third party accessed the company's proprietary code to learn how to forge cookies." Yahoo said..

Read More

Contrast News

PRESS RELEASE: Contrast Makes .NET Applications Self-Defending

Mark Hodgson, Vice President of Marketing | December 20, 2016

Los Altos, Calif. – Dec. 19, 2016Contrast Security, the leader in next-generation application security, today announced that Contrast Protect now supports Microsoft .NET applications. Contrast Protect uses runtime application self-protection..

Read More

Contrast News- Thought Leaders

What to Do about Latest Yahoo Data Breach

Christine Carrig, Director of Marketing | December 16, 2016

On Wednesday Yahoo disclosed a data breach that affected one billion accounts. Yahoo said that it believes an "unauthorized third party accessed the company's proprietary code to learn how to forge cookies." It was not clear which incident the..

Read More

Gazing Ahead: 2017 Cyber Security Predictions

Mark Hodgson, Vice President of Marketing | December 14, 2016

Contrast Security co-founders Arshan Dabirsiaghi and Jeff Williams are included in an SC Magazine article by Greg Masters entitled "Gazing Ahead: Security Predictions." This piece features a roundup of the top 2017 cyber security predictions from 50..

Read More

Thought Leaders

Obama Orders Review of Election Hacking

Jeff Williams, Co-Founder, Chief Technology Officer | December 13, 2016

BACKROUND - President Obama recently ordered a “deep dive” into the cyberattacks of this year’s election and he wants the report before he leaves office on January 20. This request comes as President-elect Trump has again dismissed the intelligence..

Read More

Contrast News

Seamless Application Security: The Rallying Cry of Amazon Web Services

Mark Hodgson, Vice President of Marketing | December 6, 2016

"Over the course of Amazon’s re:Invent conference last week, experts displayed how the cloud can be used to enable application security — even going so far as to automate functions normally tasked to teams of developers or engineers. Numerous..

Read More

Product

That Vulnerability is How Old?

Jeff Whalen, Principal Product Manager, Contrast Security | December 5, 2016

Recently, as our customers have looked at scaling out their Contrast deployments throughout their development lifecycle, one of the most requests I heard more and more was “Can Contrast help me to track and measure how we are doing against our..

Read More

Contrast News

Buyers Beware: 5 Gifts That Leave You Vulnerable to Hackers

Christine Carrig, Director of Marketing | December 1, 2016

As the holiday season kicks into full gear, this year's hottest tech gifts are on everyone's mind. Contrast Security's Co-Founder and CTO, Jeff Williams, was recently quoted in an article by Erik Sherman for The Fiscal Times. The article..

Read More

Thought Leaders

New Guide Available: Application & Data Security Volume II

Christine Carrig, Director of Marketing | November 30, 2016

A new guide, published by DZone and entitled "Application and Data Security" is now available for free. This Guide offers a deeper look into challenges and solutions for implementing secure practices. Dive into building applications that..

Read More

SIGN UP FOR BLOG UPDATES

continuous-application-security
Laptop-Blue-Bg.jpg

schedule a demo now

Discover how easy it is to spot & stop attacks in real-time.
Laptop.png
Get Demo