Skip to content

In the News

Featured

06/13/2024

Microsoft’s Brad Smith acknowledges past security failures, outlines new initiatives

Not everyone was as harsh on Microsoft’s previous mistakes. Jeff Williams, co-founder and chief technology officer at application security software platform provider Contrast Security Inc., noted that “while it’s pretty obvious in hindsight that they made a mistake, I think commentators are judging them without seeing the whole picture.”
“The unfortunate reality is that software is far more complex than most people understand,” he said. “A single application is built from dozens of source code repos, hundreds of open-source libraries, multiple application frameworks, server software and often multiple language platforms. And Microsoft has tens of thousands of applications, each of which has vulnerabilities reported all the time by tools, penetration testers, customers and more.”

Read More
Microsoft’s Brad Smith acknowledges past security failures, outlines new initiatives

04/06/2023

Financial Institutions Under Siege in Cyberspace – Tom Kellermann – ESW #312

Kellermann will discuss the recently published report “Cyber Bank Heist” that exposes the cybersecurity threats facing the financial sector. 

Read More arrow-right-tertiary

04/05/2023

Western Digital discloses cyberattack

Read More arrow-right-tertiary

04/04/2023

Western Digital Hit By Network Security Breach

Data storage device manufacturer Western Digital has disclosed information about a network security incident detected on March 26.

Read More arrow-right-tertiary

04/03/2023

ChatGPT, the AI Revolution, and the Security, Privacy and Ethical Implications

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Read More arrow-right-tertiary

03/30/2023

UK Introduces Mass Surveillance With Online Safety Bill

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into end-to-end content.

Read More arrow-right-tertiary

03/30/2023

You Can Now Track Supply Chain Attacks on GitHub

Today’s software supply chains are an amalgamation of different source codes.

Read More arrow-right-tertiary

03/28/2023

Twitter Asks Court to Subpoena GitHub Over Source Code Leak

Experts opined that the leaker could be a disgruntled former Twitter employee.

Read More arrow-right-tertiary

03/28/2023

Twitter's source code leak

Internal Twitter source code was leaked on GitHub by an unknown actor months ago, according to the New York Times. 

Read More arrow-right-tertiary

03/27/2023

Twitter Source Code Leak Should Serve As Warning Say Security Experts

After it was announced that portions of Twitter's source code were leaked online.

Read More arrow-right-tertiary

03/27/2023

Twitter hunts for suspected former employee who leaked source code on GitHub

Twitter Inc. is attempting to identify the person who leaked parts of its proprietary source code after it was discovered to have been shared on GitHub for at least three months.

Read More arrow-right-tertiary

03/27/2023

Cloud Skills Gap a Challenge for Financial Institutions

Not having the right talent can lead to poor resource management performance and unnecessary cloud spending, as well as security risks and compliance issues.

Read More arrow-right-tertiary

03/24/2023

New JCDC Pre-Ransomware Notification Initiative warns organizations, could stop cyberattacks before damage occurs

Following the setting up of the Ransomware Vulnerability Warning Pilot (RVWP) Program.

Read More arrow-right-tertiary

Experience Contrast today

Schedule a one-to-one demo to see what Contrast Runtime Security can do for you