Skip to content

Lisa Vaas, Senior Content Marketing Manager, Contrast Security

Lisa Vaas is a content machine, having spent years churning out reporting and analysis on information security and other flavors of technology. She’s now keeping the content engines revved to help keep secure code flowing at Contrast Security.

Subscribe Now
A CISO’s response to OWASP’s Top 10 Generative AI vulnerabilities: ‘This will be fun!’

A CISO’s response to OWASP’s Top 10 Generative AI vulnerabilities: ‘This will be fun!’

OWASP has spawned a Top Ten list for generative artificial intelligence (AI).

If you’re seeing zero API attacks, you’re probably not detecting them

If you’re seeing zero API attacks, you’re probably not detecting them

Last month, an ESG/Data Theorem survey about cloud-native applications and application programming interface (API)..

Get to know our CISO: The fearless, fishy, phish-fighting David Lindner

Get to know our CISO: The fearless, fishy, phish-fighting David Lindner

There are multiple ways to cheat at ice fishing, Contrast Security CISO David Lindner assures me, because he is the..

NTT DATA uses Contrast to visualize each project's detected vulnerabilities

NTT DATA uses Contrast to visualize each project's detected vulnerabilities

Contrast Security, the code security platform built for developers and trusted by security, has successfully..

Shift smart instead of following shift-left fairy tales

Shift smart instead of following shift-left fairy tales

There’s nothing quite like pushing security testing left — as in, blindly shifting the burden onto the laps of..

On-call support sucks; here’s how to make it suck less

On-call support sucks; here’s how to make it suck less

It was the week after Thanksgiving, around 1 a.m., and the company was suffering the equivalent of a heart attack in..

Contrast customer Derek Fisher on how to empower dev & security teams

Contrast customer Derek Fisher on how to empower dev & security teams

Derek Fisher — author of the newly published, acclaimed Application Security Program Handbook: A guide for software..

Who’s your fed buddy?

Who’s your fed buddy?

SAN FRANCISCO — Let’s pretend it’s 1 a.m., Saturday, on a holiday weekend: That bleary-eyed time during which cyber..

How to stop users from shooting themselves in the foot

How to stop users from shooting themselves in the foot

Earlier this month, Germany and South Korea issued a joint cybersecurity advisory warning about an advanced persistent..