Award Finalist: Contrast Security Application Detection and Response

Award Finalist: Contrast Security Application Detection and Response

Less than a month after we at Contrast Security announced Application Detection and Response, it is already a finalist for a major cybersecurity award.  ...
Award Finalist: Contrast Security Application Detection and Response

Award Finalist: Contrast Security Application Detection and Response

Less than a month after we at Contrast Security announced Application Detection and Response (ADR), it is already a finalist for a major cybersecurity award.  ...
web applications, web app, cyberthreats, vulnerable, vulnerabilities, web app attacks, SaaS, SaaS app security, cybersecurity SaaS extension

The Urgency to Uplevel AppSec: Securing Your Organization’s Vulnerable Building Blocks

Let’s examine why so many applications remain vulnerable despite high-severity warnings and how to minimize the threat to your organization ...
Security Boulevard

5 Ways MSPs Can Resolve a Hack

If you are a managed service provider (MSP) handling small and medium-sized businesses (SMB) clients, ...
Cybersecurity Insights with Contrast CISO David Lindner | 10/6

Cybersecurity Insights with Contrast CISO David Lindner | 10/6

Insight #1 AI voice cloning is a problem: It’s reportedly taken the top spot in scam trends, particularly targeting seniors. “My voice is my passport” can no longer be a thing.  ...
Cybersecurity Insights with Contrast CISO David Lindner | 9/29

Cybersecurity Insights with Contrast CISO David Lindner | 9/29

Insight #1 For years — since 2018 — the National Institute of Standards and Technology (NIST) has said that password length trumps password complexity requirements. Now LastPass is forcing users into choosing ...
MGM Breach Takeaway: On-Prem Has Become Attackers’ Gateway to the Cloud

MGM Breach Takeaway: On-Prem Has Become Attackers’ Gateway to the Cloud

Last week, the BlackCat ransomware group (also known as ALPHV) attacked the operations of MGM Resorts and forced them to shut down their IT systems. What sets this attack apart from more ...
BlackCloak, human, cyberattack, ransomware Dispossessor takedown

External Exposure Management: Key to Safeguarding Your Attack Surface

The number of security threats continues to grow rapidly with each passing year. Security teams work tirelessly to mitigate every alert labeled ‘high priority’—but there are too many, and it’s tough to ...
Security Boulevard
The LastPass Attack Gets Worse, What is Gamification, Signal's Encryption Standoff

The LastPass Attack Gets Worse, What is Gamification, Signal’s Encryption Standoff

Popular password manager LastPass suffered a second attack that lasted for over two months. Now new and disturbing information is being released about the attack. Scott discusses the benefits and challenges of ...

Major Database Security Threats & How You Can Prevent Them

Organizations and businesses must use a range of measures, protocols, and tools to protect their databases from cybercriminals. If breached, malicious actors can gain access to sensitive information that they can use ...