Skip to content

Christine Carrig, Director of Marketing

Christine’s wide breadth of marketing experience has been focused on driving revenue, building brand recognition, and creating demand-generation programs in technology organizations. For the past 11 years, her deep understanding of marketing principles, coupled with forward thinking, has been instrumental in transforming application security start-ups into successful, profitable companies.

Subscribe Now
    Topics
    owasp-logo-vert.png

    What is OWASP, and Why it Matters for AppSec

    Vulnerability research conducted by Contrast Labs was referenced in an article "What is OWASP and Why it Matters for..

    Cybersecurity Execs Voice Concern over Trump Travel Ban

    Cybersecurity Execs Voice Concern over Trump Travel Ban

    Last Friday President Trump signed executive orders that banned nationals of seven countries that included all people..

    Dashboard0127.png

    The 3 disadvantages of using WAF Network Security

    It is time… time to ditch traditional approaches to the way we have managed application security. Specifically, it’s..

    an-executive-viewpoint-in-2017-fighting-an-uphill-battle-for-cybersecurity.jpg

    An Executive Viewpoint in 2017: Fighting an Uphill Battle for Cybersecurity

    This week, Virtual Strategy Magazine posted Jeff Williams' 2017 cybersecurity predictions as part of its executive..

    Where the Industrial IoT Vulnerabilities Lurk in Your Plant

    When you connect manufacturing machinery to the internet, you've created a potential gateway for hackers to exploit...

    FoxBusiness_Logo.jpg

    The 'Exxon Valdez' of Security Breaches

    For the second time this year, Yahoo has disclosed a data breach that affected over one billion accounts. Yahoo said..

    What to Do about Latest Yahoo Data Breach

    On Wednesday Yahoo disclosed a data breach that affected one billion accounts. Yahoo said that it believes an..

    vulnerable-to-hckers.jpg

    Buyers Beware: 5 Gifts That Leave You Vulnerable to Hackers

    As the holiday season kicks into full gear, this year's hottest tech gifts are on everyone's mind. Contrast Security's..

    New Guide Available: Application & Data Security Volume II

    New Guide Available: Application & Data Security Volume II

    A new guide, published by DZone and entitled "Application and Data Security" is now available for free. This Guide..