Cybersecurity Insights with Contrast CISO David Lindner | 8/30/24

Cybersecurity Insights with Contrast CISO David Lindner | 8/30/24

Insight #1: North Korean IT spies The threat of state-sponsored cyber espionage is real and evolving. Recent reports reveal North Korean IT professionals are using stolen identities and advanced tactics to infiltrate ...
Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 6/28

Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 6/28

Insight #1 Most ransomware deploys a remote-access Trojan (RAT), which allows for secondary infections to occur and enables access to victims’ networks to be sold in Darkweb forums.   Insight #2 Most ...
The overview effect: Two decades of unique perspective

The overview effect: Two decades of unique perspective

Based on data from 2023, just under 700 people have made the (sometimes) dangerous journey to space and seen our planet in a different light. Astronauts often write about their experiences in ...
A demand for real consequences: Sonatype's response to CISA's Secure by Design

A demand for real consequences: Sonatype’s response to CISA’s Secure by Design

In the fast-changing fields of cybersecurity and software development, the importance of creating secure software is more crucial than ever. Recently, my colleagues and I at the Open Source Security Foundation (OpenSSF) ...
Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 12/8

Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 12/8

Insight #1 Guard against island hopping. The recent ransomware attack against 60 credit unions was due to the lack of proactive cybersecurity in a managed service provider (MSP).  It is high time ...
Cybersecurity Insights with Contrast CISO David Lindner | 10/13

Cybersecurity Insights with Contrast CISO David Lindner | 10/13

Insight #1 Google is now defaulting to the use of passkeys for authentication. This is a huge step in increasing the strength of the authentication mechanism out of the box for users, ...
How manufacturing best practices can improve open source consumption and software supply chains

How manufacturing best practices can improve open source consumption and software supply chains

The biggest problem facing software organizations today is an inability to track, monitor, and improve the usage of open source software. This isn’t about security alone. From DevOps to DevSecOps, there are ...
Cybersecurity Insights with Contrast CISO David Lindner | 10/6

Cybersecurity Insights with Contrast CISO David Lindner | 10/6

Insight #1 AI voice cloning is a problem: It’s reportedly taken the top spot in scam trends, particularly targeting seniors. “My voice is my passport” can no longer be a thing.  ...
Cybersecurity Insights with Contrast CISO David Lindner | 9/29

Cybersecurity Insights with Contrast CISO David Lindner | 9/29

Insight #1 For years — since 2018 — the National Institute of Standards and Technology (NIST) has said that password length trumps password complexity requirements. Now LastPass is forcing users into choosing ...

Application Security Check Up