SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

An Executive Viewpoint in 2017: Fighting an Uphill Battle for Cybersecurity

This week, Virtual Strategy Magazine posted Jeff Williams' 2017 cybersecurity predictions as part of its executive viewpoint roundup. Jeff’s predictions focus on cybersecurity’s uphill battle and the explosions we can expect to see along the way.

Continue Reading >>

WOO HOO... Contrast Security a Finalist for RSA Innovation Sandbox 2017

Please reserve time at RSA on Monday, February 13 at 1:00 PM, to see RSA Innovation Sandbox 2017 finalist Contrast Security present its innovative self-protecting software technology.

RSA Conference, the world’s leading information security..

Continue Reading >>

Where the Industrial IoT Vulnerabilities Lurk in Your Plant

When you connect manufacturing machinery to the internet, you've created a potential gateway for hackers to exploit. Here's a look at the risks you might be facing.

Who would have thought a bunch of DVRs could slow down -- and in some cases, bring..

Continue Reading >>

The 'Exxon Valdez' of Security Breaches

For the second time this year, Yahoo has disclosed a data breach that affected over one billion accounts. Yahoo said that it believes an "unauthorized third party accessed the company's proprietary code to learn how to forge cookies." Yahoo said..

Continue Reading >>

What to Do about Latest Yahoo Data Breach

On Wednesday Yahoo disclosed a data breach that affected one billion accounts. Yahoo said that it believes an "unauthorized third party accessed the company's proprietary code to learn how to forge cookies." It was not clear which incident the..

Continue Reading >>

Seamless Application Security: The Rallying Cry of Amazon Web Services

"Over the course of Amazon’s re:Invent conference last week, experts displayed how the cloud can be used to enable application security — even going so far as to automate functions normally tasked to teams of developers or engineers. Numerous..

Continue Reading >>

Buyers Beware: 5 Gifts That Leave You Vulnerable to Hackers

As the holiday season kicks into full gear, this year's hottest tech gifts are on everyone's mind. Contrast Security's Co-Founder and CTO, Jeff Williams, was recently quoted in an article by Erik Sherman for The Fiscal Times. The article..

Continue Reading >>

Vote Now for Contrast Security in the 2017 Cybersecurity Excellence Awards

The annual Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security.

Continue Reading >>

Contrast Security Recognized as a Finalist in Two 2017 SC Awards Categories

Contrast Security has been selected as a finalist for two SC Awards this year in the “Best Web Application Solution” and “Rookie Security Company of the Year” categories! For those who may be unaware, the SC Awards honor the achievements of..

Continue Reading >>

What Happens to Application Security When Your Apps Go to the Cloud?

This article discusses the pros of applications moving to the cloud, the security dilemma’s surrounding the move, and the explosion of software defined networks and tools. It first appeared in App Developer Magazine on November 9th, 2016. Below..

Continue Reading >>

SUBSCRIBE TO THE BLOG