Skip to content

Christine Carrig, Director of Marketing

Christine’s wide breadth of marketing experience has been focused on driving revenue, building brand recognition, and creating demand-generation programs in technology organizations. For the past 11 years, her deep understanding of marketing principles, coupled with forward thinking, has been instrumental in transforming application security start-ups into successful, profitable companies.

Subscribe Now
owasp-logo-vert.png

What is OWASP, and Why it Matters for AppSec

Vulnerability research conducted by Contrast Labs was referenced in an article "What is OWASP and Why it Matters for..

Cybersecurity Execs Voice Concern over Trump Travel Ban

Cybersecurity Execs Voice Concern over Trump Travel Ban

Last Friday President Trump signed executive orders that banned nationals of seven countries that included all people..

Dashboard0127.png

The 3 disadvantages of using WAF Network Security

It is time… time to ditch traditional approaches to the way we have managed application security. Specifically, it’s..

an-executive-viewpoint-in-2017-fighting-an-uphill-battle-for-cybersecurity.jpg

An Executive Viewpoint in 2017: Fighting an Uphill Battle for Cybersecurity

This week, Virtual Strategy Magazine posted Jeff Williams' 2017 cybersecurity predictions as part of its executive..

Where the Industrial IoT Vulnerabilities Lurk in Your Plant

When you connect manufacturing machinery to the internet, you've created a potential gateway for hackers to exploit...

FoxBusiness_Logo.jpg

The 'Exxon Valdez' of Security Breaches

For the second time this year, Yahoo has disclosed a data breach that affected over one billion accounts. Yahoo said..

What to Do about Latest Yahoo Data Breach

On Wednesday Yahoo disclosed a data breach that affected one billion accounts. Yahoo said that it believes an..

vulnerable-to-hckers.jpg

Buyers Beware: 5 Gifts That Leave You Vulnerable to Hackers

As the holiday season kicks into full gear, this year's hottest tech gifts are on everyone's mind. Contrast Security's..

New Guide Available: Application & Data Security Volume II

New Guide Available: Application & Data Security Volume II

A new guide, published by DZone and entitled "Application and Data Security" is now available for free. This Guide..