SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

Where the Industrial IoT Vulnerabilities Lurk in Your Plant

When you connect manufacturing machinery to the internet, you've created a potential gateway for hackers to exploit. Here's a look at the risks you might be facing.

Who would have thought a bunch of DVRs could slow down -- and in some cases, bring..

Continue Reading >>

The 'Exxon Valdez' of Security Breaches

For the second time this year, Yahoo has disclosed a data breach that affected over one billion accounts. Yahoo said that it believes an "unauthorized third party accessed the company's proprietary code to learn how to forge cookies." Yahoo said..

Continue Reading >>

What to Do about Latest Yahoo Data Breach

On Wednesday Yahoo disclosed a data breach that affected one billion accounts. Yahoo said that it believes an "unauthorized third party accessed the company's proprietary code to learn how to forge cookies." It was not clear which incident the..

Continue Reading >>

Seamless Application Security: The Rallying Cry of Amazon Web Services

"Over the course of Amazon’s re:Invent conference last week, experts displayed how the cloud can be used to enable application security — even going so far as to automate functions normally tasked to teams of developers or engineers. Numerous..

Continue Reading >>

Buyers Beware: 5 Gifts That Leave You Vulnerable to Hackers

As the holiday season kicks into full gear, this year's hottest tech gifts are on everyone's mind. Contrast Security's Co-Founder and CTO, Jeff Williams, was recently quoted in an article by Erik Sherman for The Fiscal Times. The article..

Continue Reading >>

Vote Now for Contrast Security in the 2017 Cybersecurity Excellence Awards

The annual Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security.

Continue Reading >>

Contrast Security Recognized as a Finalist in Two 2017 SC Awards Categories

Contrast Security has been selected as a finalist for two SC Awards this year in the “Best Web Application Solution” and “Rookie Security Company of the Year” categories! For those who may be unaware, the SC Awards honor the achievements of..

Continue Reading >>

What Happens to Application Security When Your Apps Go to the Cloud?

This article discusses the pros of applications moving to the cloud, the security dilemma’s surrounding the move, and the explosion of software defined networks and tools. It first appeared in App Developer Magazine on November 9th, 2016. Below..

Continue Reading >>

TechTarget: "Getting runtime application self-protection launched"

In this piece, Ed Tittle of TechTarget, dives into how, while runtime application self-protection is a mouthful, it’s also a technology that’s absurdly easy to use. He then discusses how selecting the right implementation, at the right price, is..

Continue Reading >>

Application Security: How Microsoft’s Chairman is Fighting Hackers

"We've got to start to rethink the application security paradigm, not just the information security paradigm," Thompson said in an interview. "There have not been a lot of ideas that have emerged in that domain."

Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook