SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

How To Select The Right Products For Your Cybersecurity Portfolio

So far in his cybersecurity series, Dan Woods' Forbes articles have focused on how to build the right cybersecurity portfolio for your business. He has outlined three key steps companies should take, and advocated that companies not overspend on..

Continue Reading >>

US Needs a Federal CISO — A Response to the Appointment of a US Cybersecurity Coordinator

In response to the Trump administration announcement of the appointment of a White House cybersecurity coordinator. Contrast Security Co-founder and CTO, Jeff Williams, was ask to provide his thoughts in a recently published CSO article, "US Needs a..

Continue Reading >>

The WikiLeaks CIA Dump Dominates AppSec News Coverage

WikiLeaks has been dominating recent news when it released "Vault 7", a new series of leaks it claims came from the United States Central Intelligence Agency (CIA). WikiLeaks delared that Vault 7  "is the largest ever publication of confidential..

Continue Reading >>

Crash Testing your Connected Stuff — Before you Get Hacked!

People have to pay to subscribe to Consumer Reports. But you may benefit from a new wave of security testing — for free. According to Archer News you may soon be able to tell if that "thing" you want to buy will keep you safe from hackers or..

Continue Reading >>

3/16 WEBINAR: Scaling Rugged DevOps

Attend a live webinar on Thursday, March 16th and hear how Tim Chase of Nielsen is scaling their DevOps function by:• Instrumenting their software application portfolio• Assessing and protecting applications in parallel• Deploying Integrations that..

Continue Reading >>

A Word About Security in Application LifeCycle Management (ALM)

Agile development and DevOps are fueling the evolution of application lifecycle management (ALM) as delivery cycles continue to shrink. While the original promise of end-to-end visibility and traceability is still important, today’s ALM is more..

Continue Reading >>

Cybersecurity Execs Voice Concern over Trump Travel Ban

Last Friday President Trump signed executive orders that banned nationals of seven countries that included all people hailing from: Iraq, Syria, Iran, Libya, Somalia, Sudan and Yemen. The executive order also bans entry of those fleeing from..

Continue Reading >>

DevOps Security: Turn Security into Code [RSA Preview]

The San Francisco edition of the annual RSA security conference is just around the corner. DevOps security is a hot topic right now, and the RSA schedule includes a day-long seminar dubbed "DevOps Connect: DevSecOps Edition."

The list of security..

Continue Reading >>

An Executive Viewpoint in 2017: Fighting an Uphill Battle for Cybersecurity

This week, Virtual Strategy Magazine posted Jeff Williams' 2017 cybersecurity predictions as part of its executive viewpoint roundup. Jeff’s predictions focus on cybersecurity’s uphill battle and the explosions we can expect to see along the way.

Continue Reading >>

WOO HOO... Contrast Security a Finalist for RSA Innovation Sandbox 2017

Please reserve time at RSA on Monday, February 13 at 1:00 PM, to see RSA Innovation Sandbox 2017 finalist Contrast Security present its innovative self-protecting software technology.

RSA Conference, the world’s leading information security..

Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook