SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

Christine Carrig, Director of Marketing

Christine’s wide breadth of marketing experience has been focused on driving revenue, building brand recognition, and creating demand-generation programs in technology organizations. For the past 11 years, her deep understanding of marketing principles, coupled with forward thinking, has been instrumental in transforming application security start-ups into successful, profitable companies.

Connect With Us :  

Poor Election Cybersecurity Abounds

In an SC Magazine article published earlier this week, Larry Jaffee discusses the potential cybersecurity concerns of next week’s presidential election (yikes, Election Day is next Tuesday). Jeff Williams, CTO and cofounder of Contrast Security,..

Continue Reading >>

Chat all you want… but will that data in your message be secure?

Businesses are looking to tools to improve productivity — no surprise right. Business apps are not just “stand-alone” and isolated but they are in the cloud and integrated with other tools and data. Integrations and “plug-ins” with other apps and..

Continue Reading >>

Application Security: How Microsoft’s Chairman is Fighting Hackers

"We've got to start to rethink the application security paradigm, not just the information security paradigm," Thompson said in an interview. "There have not been a lot of ideas that have emerged in that domain."

Continue Reading >>

Insights from a CISO: Compliance & Application Security

Contrast interviews folks who are "Security Influencer's" and then shares their knowledge via online media. We see Security Influencers as thought leaders and security experts who provide real-world insight and “in-the-trenches” experience on..

Continue Reading >>

Insecure Code: TechBeacon Talks Dangerous Code & Programming Missteps

This week, Erik Sherman of TechBeacon mentioned Jeff Williams, Contast Security CTO and Co-Founder, in an article on the consequences of insecure code "21 Dangerous Pieces of Code and Programming Mishaps". He points out that software is powerful..

Continue Reading >>

How Secure Are Your Third-Party Libraries?

Does your current AppSec tool provide you with the visibility and control you need?

Unlike legacy solutions, Contrast Assess takes a radically new approach by inserting passive sensors across the entire application stack. It then feeds events into a..

Continue Reading >>

Why We Should Score Data Breaches

Contrast's CTO and Co-Founder, Jeff Williams, was interviewed by Forbes Magazine at Black Hat USA 2016 earlier this month. The interview focused on recent healthcare breaches and why we (the industry) should score data breaches. Jeff is quoted..

Continue Reading >>

Jeff Williams Selected as Finalist for the Dark Reading’s Best of Black Hat Innovator Awards

Our CTO and cofounder Jeff Williams has been selected as one of three finalists for Dark Reading’s Best of Black Hat Most Innovative Thought Leader Award! Individuals selected for this award have demonstrated leadership that impacted other..

Continue Reading >>

First-of-its-kind Cyber Security Product Unifies Vulnerability Detection & Attack Protection

Contrast Introduces Continuous Application Security

Contrast Security, the next generation leader in finding vulnerabilities and blocking attacks on software applications, today announced Contrast Enterprise as the first and only enterprise security..

Continue Reading >>

Contrast Security honored as Best of Breed winner in the 4th Annual 2016 Cyber Defense Magazine Infosec Awards in Application Security

Recognizing Innovation During the RSA® Conference 2016 

Palo Alto, Calif. – February 29, 2016 - Contrast Security, the next generation leader in finding vulnerabilities and blocking attacks on software applications, announced today that Cyber..

Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook