Cybersecurity Insights with Contrast CISO David Lindner | 04/25/25

Cybersecurity Insights with Contrast CISO David Lindner | 04/25/25

Insight No. 1 — Fast code, slow security? Think ADR Consider the scenario: Development teams are pushing code at unprecedented speeds, and vulnerabilities, whether human or AI-generated, are lingering far too long ...
Okta Breach Analysis  I   RevealSecurity

Why SaaS Identity Abuse is This Year’s Ransomware

By Adam Koblentz Ransomware targeting endpoints and on-premises IT infrastructure has been a primary battleground for enterprise security teams in recent years. One of the highest-profile threat actor groups in this space ...
Okta Breach Analysis  I   RevealSecurity

Snowflake and the Continuing Identity Threat Detection Gap Across SaaS and Cloud

By Adam Koblentz In recent weeks, a new wide-scale identity security incident has been unfolding that is refocusing the spotlight on important questions such as: Why are account takeover, credential misuse, and ...
Okta Breach Analysis  I   RevealSecurity

Watch: “Behavior Doesn’t Lie:” The Power of ML for Identity Threat Detection and Response

Traditional security controls like MFA and PAM are bypassed easily by threat actors on a regular basis. Threat actors prefer breaking into organizations using legitimate credentials so they can achieve their goals ...
Okta Breach Analysis  I   RevealSecurity

Why SaaS Identity Abuse is This Year’s Ransomware

Let’s explore some of the details behind this escalating threat to SaaS applications, what may be driving it, and what you can do to better protect your SaaS footprint from these types ...
Okta Breach Analysis  I   RevealSecurity

Snowflake and the Continuing Identity Threat Detection Gap Across SaaS and Cloud

By Adam Koblentz In recent weeks, a new wide-scale identity security incident has been unfolding that is refocusing the spotlight on important questions such as: Why are account takeover, credential misuse, and ...
Okta Breach Analysis  I   RevealSecurity

Watch: “Behavior Doesn’t Lie:” The Power of ML for Identity Threat Detection and Response

Traditional security controls like MFA and PAM are bypassed easily by threat actors on a regular basis. Threat actors prefer breaking into organizations using legitimate credentials so they can achieve their goals ...