Credentials Theft Login Snowflake

From a Snowflake to a Snowball: How to Detect and Stop Impersonation Attacks

Migrating to the cloud is a lot more than just "lift and shift". It requires cross-organizational adaptation, and a comprehensive view - from left to right. The post From a Snowflake to ...
Cybersecurity Insights with Contrast CISO David Lindner | 5/31/24

Cybersecurity Insights with Contrast CISO David Lindner | 5/31/24

Insight #1 Transparency isn't just about promising action, it's about proving it. It means sharing the data and results that show you're following through on your commitments ...
Cybersecurity Insights with Contrast CISO David Lindner | 5/24/24

Cybersecurity Insights with Contrast CISO David Lindner | 5/24/24

Insight #1 Tool consolidation continues, with Palo Alto’s plans to absorb IBM's QRadar software. This movement will continue and makes sense for the consumers of security software, as well. The reasons are ...
Cybersecurity Insights with Contrast CISO David Lindner | 5/24/24

Cybersecurity Insights with Contrast CISO David Lindner | 5/24/24

Insight #1 Tool consolidation continues, with Palo Alto’s plans to absorb IBM's QRadar software. This movement will continue and makes sense for the consumers of security software, as well. The reasons are ...
Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24

Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24

Insight #1 One of the most significant errors an organization can make is assuming they are not a target. This belief is especially prevalent among small and medium-sized businesses (SMBs), and it ...
Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24

Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24

Insight #1 One of the most significant errors an organization can make is assuming they are not a target. This belief is especially prevalent among small and medium-sized businesses (SMBs), and it ...

Of XZ and Unknown Unknowns

Migrating to the cloud is a lot more than just "lift and shift". It requires cross-organizational adaptation, and a comprehensive view - from left to right. The post Of XZ and Unknown ...
Getting rid of a 20+ year old known vulnerability: It’s like a PSA for Runtime Security

Getting rid of a 20+ year old known vulnerability: It’s like a PSA for Runtime Security

On Wednesday, March 27, CISA and the FBI issued a cry for help: We need to stamp out SQL injection vulnerabilities, and we need to do it yesterday, they said in a ...
Elevate Node.js Security with v5 Node Agent | Contrast Security

Elevate Node.js Security with v5 Node Agent | Contrast Security

Node.js is an incredibly popular programming environment, highly regarded for its efficiency and scalability. It powers a wide range of applications, from web applications to real-time chat applications, application programming interfaces (APIs) ...