Attack

Award Finalist: Contrast Security Application Detection and Response
Less than a month after we at Contrast Security announced Application Detection and Response, it is already a finalist for a major cybersecurity award. ...

Award Finalist: Contrast Security Application Detection and Response
Less than a month after we at Contrast Security announced Application Detection and Response (ADR), it is already a finalist for a major cybersecurity award. ...

The Urgency to Uplevel AppSec: Securing Your Organization’s Vulnerable Building Blocks
Let’s examine why so many applications remain vulnerable despite high-severity warnings and how to minimize the threat to your organization ...
5 Ways MSPs Can Resolve a Hack
If you are a managed service provider (MSP) handling small and medium-sized businesses (SMB) clients, ...

Cybersecurity Insights with Contrast CISO David Lindner | 10/6
Insight #1 AI voice cloning is a problem: It’s reportedly taken the top spot in scam trends, particularly targeting seniors. “My voice is my passport” can no longer be a thing. ...

Cybersecurity Insights with Contrast CISO David Lindner | 9/29
Insight #1 For years — since 2018 — the National Institute of Standards and Technology (NIST) has said that password length trumps password complexity requirements. Now LastPass is forcing users into choosing ...

MGM Breach Takeaway: On-Prem Has Become Attackers’ Gateway to the Cloud
Last week, the BlackCat ransomware group (also known as ALPHV) attacked the operations of MGM Resorts and forced them to shut down their IT systems. What sets this attack apart from more ...

External Exposure Management: Key to Safeguarding Your Attack Surface
The number of security threats continues to grow rapidly with each passing year. Security teams work tirelessly to mitigate every alert labeled ‘high priority’—but there are too many, and it’s tough to ...

The LastPass Attack Gets Worse, What is Gamification, Signal’s Encryption Standoff
Popular password manager LastPass suffered a second attack that lasted for over two months. Now new and disturbing information is being released about the attack. Scott discusses the benefits and challenges of ...
Major Database Security Threats & How You Can Prevent Them
Organizations and businesses must use a range of measures, protocols, and tools to protect their databases from cybercriminals. If breached, malicious actors can gain access to sensitive information that they can use ...