Skip to content

Tom Kellermann, SVP Cyber Strategy, Contrast Security

Subscribe Now
    Topics
    How to use Runtime Security to protect risks to both APIs and legacy COTS

    How to use Runtime Security to protect risks to both APIs and legacy COTS

    It used to be that the weakest link in the enterprise IT security chain was the user, but times have changed.

    Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 12/8

    Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 12/8

    Insight #1 Guard against island hopping. The recent ransomware attack against 60 credit unions was due to the lack of..

    Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 12/1

    Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 12/1

    Insight #1 The upcoming disclosure requirements from the Securities Exchange Commission (SEC) (PDF) are game-changing...

    Attack-path mapping your applications

    Attack-path mapping your applications

    Contrast Security’s 2023Cyber Bank Heists report showed that hackers and cybercrime cartels from Russia, North Korea..

    The evolution of island hopping

    The evolution of island hopping

    Cyber Bank Heists report sheds light on the evolution of island-hopping cyber threats This year’sCyber Bank Heists..

    Your WAF doesn't have your back

    Your WAF doesn't have your back

    Why WAFs leave you adrift in the treacherous waters of cybersecurity In the ever-shifting currents of the cybersecurity..

    Financial cybercrime trends: Reverse BEC & ‘shoxing’

    Financial cybercrime trends: Reverse BEC & ‘shoxing’

    Turla — a Russian advanced persistent threat (APT) group closely affiliated with the FSB Russian intelligence agency —..

    Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 7/7

    Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 7/7

    Insight #1 When responding to a ransomware attack, recognize that most ransomware will deploy a remote-access Trojan..

    Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 6/30

    Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 6/30