Cybersecurity Awareness Month: How Contrast & the threat landscape have evolved

Cybersecurity Awareness Month: How Contrast & the threat landscape have evolved

This year marks the 20th year for Cybersecurity Awareness Month (CSAM), and the National Cybersecurity Alliance (NCA) marked it by extending its typically month-long campaign to raise awareness about digital security to ...
What is DORA? | Compliance Requirements for EU DORA Regulations | Contrast Security

What is DORA? | Compliance Requirements for EU DORA Regulations | Contrast Security

Cyberattacks, supply-chain issues, flooding, tsunamis, wildfires, equipment failures and even war: The financial sector has no choice but to keep operations running through all these — among other — types of disruptions, ...
Runtime Security fits fast-paced AppDev environments | Contrast Security

Runtime Security fits fast-paced AppDev environments | Contrast Security

Are traditional AppSec tools keeping up with advances in software? That was the question The Application Security Podcast host Chris Romeo recently asked Contrast Security Co-founder and Chief Technology Officer Jeff Williams.  ...
WAF cybersecurity limitations and alternatives | Contrast Security

WAF cybersecurity limitations and alternatives | Contrast Security

Why WAFs leave you adrift in the treacherous waters of cybersecurity In the ever-shifting currents of the cybersecurity ocean, debates about the relevance and effectiveness of various defense mechanisms continue to surface, ...
The Need for Deterministic Security

Experts Say Cyber Attacks Are Getting Worse

A new article on WNEP is reporting on experts who claim that cyber attacks are getting worse.  Not surprising at the top of the list is ransomware attacks., which have made headlines, ...
The Need for Deterministic Security

Mitre Top 25 Software Weaknesses

In addition to OWASP finally updating the Top 10 Web Application Risks, this year Mitre also updated their Top 25 Most Dangerous Software Bugs, also known as the CWE Top 25.  One ...
The Need for Deterministic Security

NIST SP800-53 Revision 5, One Year Later

It will be one year since NIST released their final version of SP800-53 Revision 5 on September 23, 2020.  As a quick reminder SP800-53 is the document issued by NIST that specifies ...
The Need for Deterministic Security

OWASP Working Group Releases Draft of Top 10 Web Application Risks for 2021

The Open Web Application Security Project (OWASP) has released its draft Top 10 Web Application Security Risks 2021 list with a number of changes from the 2017 list (the last time the list ...