SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

Insights from a CISO: Compliance & Application Security

Contrast interviews folks who are "Security Influencer's" and then shares their knowledge via online media. We see Security Influencers as thought leaders and security experts who provide real-world insight and “in-the-trenches” experience on..

Continue Reading >>

60 Minutes & the "Signaling System Seven (SS7) Vulnerability"

Over the weekend, 60 Minutes featured a segment on how cellphones and mobile phone networks are vulnerable to hacking, exploiting a security flaw discovered in Signaling System Seven – or SS7. According to security researcher Karsten Nohl, “the..

Continue Reading >>

Insecure Code: TechBeacon Talks Dangerous Code & Programming Missteps

This week, Erik Sherman of TechBeacon mentioned Jeff Williams, Contast Security CTO and Co-Founder, in an article on the consequences of insecure code "21 Dangerous Pieces of Code and Programming Mishaps". He points out that software is powerful..

Continue Reading >>

The Most Important Elements of Data & Application Security

DZone recently interviewed 19 application and data security executives to gather insights and trends and business practices. Jeff Williasms, Contrast Security CTO and Co-Founder was interviewed to provide his observations.

Continue Reading >>

My Top 5 Cyber Security Predictions for 2016

It's that time of year for my top predictions for 2016.  And, let's review how well I did for 2015:

My 2016 predictions include:

  1. We will see a major attack that takes advantage of our totally unprotected development infrastructure.
  2. We will..
Continue Reading >>

Interview: Jacob West, Chief Architect for Security Products at Netsuite

Thanks, everyone, for joining us on the Security Influencers Channel. We ask industry thought leaders to share their experiences and ideas about security in the future. We're hosting a series of brief and highly informative interviews with..

Continue Reading >>

Interview: Casey Fleming, Chairman & CEO of BLACKOPS Partners

Thanks, everyone, for joining us on the Security Influencers Channel. We're hosting a series of brief and highly informative interviews with influential security leaders and in 2015, we're talking about the implications of rapid software..

Continue Reading >>

Interview: Doug Depeppe of Eoesedge Legal, Cyberlaw and Services

Thanks, everyone, for joining us on the Security Influencers Channel. We're hosting a series of brief and highly informative interviews with influential security leaders and in 2015, we're talking about the implications of rapid software..

Continue Reading >>

Interview: Ed Alcantara, CSO of Darknet BlackOps Intelligence

Thanks, everyone, for joining us on the Security Influencers Channel. We're hosting a series of brief and highly informative interviews with influential security leaders and in 2015, we're talking about the implications of rapid software..

Continue Reading >>

Interview: Stuart McClure, CEO of Cylance, Inc.

Thanks, everyone, for joining us on the Security Influencers Channel. We're hosting a series of brief and highly informative interviews with influential security leaders and in 2015, we're talking about the implications of rapid software..

Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook