ADR Blocks Spike in Cyber Attacks and Sharp Rise in Path Traversal Attacks  | April Attack Data | Contrast Security

ADR Blocks Spike in Cyber Attacks and Sharp Rise in Path Traversal Attacks | April Attack Data | Contrast Security

Customers using Application Detection and Response (ADR) technology blocked a remarkable number of attacks over the past month. For the second time since we began writing this monthly report, we’ve seen a ...
Malicious package detection: Sonatype secures software supply chains

Malicious package detection: Sonatype secures software supply chains

Malicious packages present a growing danger to software supply chains. From typosquatting attacks to sophisticated malware hidden within open source components, detecting and preventing malicious packages has become essential for ensuring the ...
Application Detection and Response (ADR): A Game-changing SOC Analyst Tool | Contrast Security

Application Detection and Response (ADR): A Game-changing SOC Analyst Tool | Contrast Security

Paged at 3 a.m. again … we had another breach to respond to in the security operations center (SOC). While the incident response team was busy delegating roles and responsibilities, I was ...
security, cybersecurity, threat, NDR

Choosing the Best Cybersecurity Prioritization Method for Your Organization

| | Detection, NDR, Response, threats
Threat monitoring and detection, such as Network Detection and Response (NDR), provide a complement to enhance a threat exposure management strategy ...
Security Boulevard
Application Detection and Response: Understanding ADR’s Detection and Response Layers | Contrast Security

Application Detection and Response: Understanding ADR’s Detection and Response Layers | Contrast Security

Airport security is a lot like cybersecurity. Each is a cumbersome process aimed at protecting valuable assets. Both involve detection and response. In both airport and cyber security, the approach is to ...
Google, Wiz, Cnapp, Exabeam, CNAPP, cloud threat, detections, threats, CNAP, severless architecture, itte Broadcom report cloud security threat

How to Stay One Step Ahead of Data Breaches and Master Cloud Threat Detection

Implementing a cloud threat detection system enhances your team's ability to maintain a strong security posture without significant overhead ...
Security Boulevard
Prioritization of the Detection Engineering Backlog

Prioritization of the Detection Engineering Backlog

Written by Joshua Prager and Emily LeidyIntroductionStrategically maturing a detection engineering function requires us to divide the overall function into smaller discrete problems. One such seemingly innocuous area of detection engineering is the ...
On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 7: Synonyms“Experience is forever in motion, ramifying and unpredictable. In order for us to know anything at all, that thing must have enduring properties. If all things flow, and one can never ...
On Trust and Transparency in Detection

On Trust and Transparency in Detection

| | Detection, threat detection
This blog / mini-paper is written jointly with Oliver Rochford.When we detect threats we expect to know what we are detecting. Sounds painfully obvious, right? But it is very clear to us ...
On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 3: Expanding the Function Call GraphIntroductionIn the previous post in this series, I introduced the concept of operations and demonstrated how each operation has a function call graph that undergirds it. In ...