SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

Christine Carrig, Director of Marketing

Christine’s wide breadth of marketing experience has been focused on driving revenue, building brand recognition, and creating demand-generation programs in technology organizations. For the past 11 years, her deep understanding of marketing principles, coupled with forward thinking, has been instrumental in transforming application security start-ups into successful, profitable companies.

Connect With Us :  

The 3 disadvantages of using WAF Network Security

It is time… time to ditch traditional approaches to the way we have managed application security. Specifically, it’s time to ditch your Web Application Firewalls (WAFs). Ten to fifteen years ago, WAF network security revolutionized the way we..

Continue Reading >>

An Executive Viewpoint in 2017: Fighting an Uphill Battle for Cybersecurity

This week, Virtual Strategy Magazine posted Jeff Williams' 2017 cybersecurity predictions as part of its executive viewpoint roundup. Jeff’s predictions focus on cybersecurity’s uphill battle and the explosions we can expect to see along the way.

Continue Reading >>

Where the Industrial IoT Vulnerabilities Lurk in Your Plant

When you connect manufacturing machinery to the internet, you've created a potential gateway for hackers to exploit. Here's a look at the risks you might be facing.

Who would have thought a bunch of DVRs could slow down -- and in some cases, bring..

Continue Reading >>

The 'Exxon Valdez' of Security Breaches

For the second time this year, Yahoo has disclosed a data breach that affected over one billion accounts. Yahoo said that it believes an "unauthorized third party accessed the company's proprietary code to learn how to forge cookies." Yahoo said..

Continue Reading >>

What to Do about Latest Yahoo Data Breach

On Wednesday Yahoo disclosed a data breach that affected one billion accounts. Yahoo said that it believes an "unauthorized third party accessed the company's proprietary code to learn how to forge cookies." It was not clear which incident the..

Continue Reading >>

Buyers Beware: 5 Gifts That Leave You Vulnerable to Hackers

As the holiday season kicks into full gear, this year's hottest tech gifts are on everyone's mind. Contrast Security's Co-Founder and CTO, Jeff Williams, was recently quoted in an article by Erik Sherman for The Fiscal Times. The article..

Continue Reading >>

New Guide Available: Application & Data Security Volume II

A new guide, published by DZone and entitled "Application and Data Security" is now available for free. This Guide offers a deeper look into challenges and solutions for implementing secure practices. Dive into building applications that..

Continue Reading >>

What Happens to Application Security When Your Apps Go to the Cloud?

This article discusses the pros of applications moving to the cloud, the security dilemma’s surrounding the move, and the explosion of software defined networks and tools. It first appeared in App Developer Magazine on November 9th, 2016. Below..

Continue Reading >>

The Impact of Fake Retail Apps Hitting the Apple App Store this Year

Last week, App Developer Magazine, in an article titled "The Impact of Fake Retail Apps Hitting the Apple App Store this Year" prominently features Contrast Security Co-founder and CTO Jeff Williams. The article discusses how counterfeiters have..

Continue Reading >>

The DevOpsification of Security

In an article "The DevOpsification of Security," written by Redpoint Ventures principal Lenny Pruss, Contrast Security is mentioned as a leading "app-centric visibility tool."  Lenny's premise is that: 

"The reality is that security, like DevOps,..

Continue Reading >>

SUBSCRIBE TO THE BLOG