application detection and response

Application-Layer Visibility and Security | Contrast ADR vs Traditional Tools | Contrast Security
Imagine you're a lifeguard at a beach, but you're only allowed to watch from a helicopter or from a camera mounted on the boardwalk. Sure, you’ll see some splashing — maybe even ...

Cybersecurity Insights with Contrast CISO David Lindner | 04/25/25
Insight No. 1 — Fast code, slow security? Think ADR Consider the scenario: Development teams are pushing code at unprecedented speeds, and vulnerabilities, whether human or AI-generated, are lingering far too long ...

Why SaaS Identity Abuse is This Year’s Ransomware
By Adam Koblentz Ransomware targeting endpoints and on-premises IT infrastructure has been a primary battleground for enterprise security teams in recent years. One of the highest-profile threat actor groups in this space ...

Snowflake and the Continuing Identity Threat Detection Gap Across SaaS and Cloud
By Adam Koblentz In recent weeks, a new wide-scale identity security incident has been unfolding that is refocusing the spotlight on important questions such as: Why are account takeover, credential misuse, and ...

Watch: “Behavior Doesn’t Lie:” The Power of ML for Identity Threat Detection and Response
Traditional security controls like MFA and PAM are bypassed easily by threat actors on a regular basis. Threat actors prefer breaking into organizations using legitimate credentials so they can achieve their goals ...

Why SaaS Identity Abuse is This Year’s Ransomware
Let’s explore some of the details behind this escalating threat to SaaS applications, what may be driving it, and what you can do to better protect your SaaS footprint from these types ...

Snowflake and the Continuing Identity Threat Detection Gap Across SaaS and Cloud
By Adam Koblentz In recent weeks, a new wide-scale identity security incident has been unfolding that is refocusing the spotlight on important questions such as: Why are account takeover, credential misuse, and ...

Watch: “Behavior Doesn’t Lie:” The Power of ML for Identity Threat Detection and Response
Traditional security controls like MFA and PAM are bypassed easily by threat actors on a regular basis. Threat actors prefer breaking into organizations using legitimate credentials so they can achieve their goals ...