Skip to content

In the News

Featured

06/13/2024

Microsoft’s Brad Smith acknowledges past security failures, outlines new initiatives

Not everyone was as harsh on Microsoft’s previous mistakes. Jeff Williams, co-founder and chief technology officer at application security software platform provider Contrast Security Inc., noted that “while it’s pretty obvious in hindsight that they made a mistake, I think commentators are judging them without seeing the whole picture.”
“The unfortunate reality is that software is far more complex than most people understand,” he said. “A single application is built from dozens of source code repos, hundreds of open-source libraries, multiple application frameworks, server software and often multiple language platforms. And Microsoft has tens of thousands of applications, each of which has vulnerabilities reported all the time by tools, penetration testers, customers and more.”

Read More
Microsoft’s Brad Smith acknowledges past security failures, outlines new initiatives

09/16/2022

Factbox: What to do if you were a corporate hack victim

A reported breach of Uber Technologies Inc's (UBER.N)

Read More arrow-right-tertiary

09/16/2022

Uber investigating security breach of several internal systems

Communications and engineering systems were taken offline after hacker sends images of repositories to cybersecurity researchers and The New York Times.

Read More arrow-right-tertiary

09/16/2022

Industry Reactions to Govt Requiring Security Guarantees From Software Vendors

The White House has announced new guidance with the aim of ensuring that federal agencies only use secure software.

Read More arrow-right-tertiary

09/15/2022

White House issues a memorandum on software supply chain security

The White House yesterday issued guidance for Federal agencies’ use of software security practices. 

Read More arrow-right-tertiary

09/15/2022

White House: U.S. agencies have 90 days to create inventory of all software

he White House released new guidance this week ordering federal agencies to create a full inventory of the software they use within 90 days. 

Read More arrow-right-tertiary

09/15/2022

3 Key Resume Tips for iOS Developers Seeking a Job

Submitting a resume is often a nerve-wracking experience. 

Read More arrow-right-tertiary

09/15/2022

White House issues a memorandum on software supply chain security.

The White House yesterday issued guidance for Federal agencies’ use of software security practices. 

Read More arrow-right-tertiary

09/15/2022

Former Conti Ransomware Members, Tools Linked To Initial Access Broker Targeting Ukraine

Five attack campaigns conducted against Ukrainian government agencies and businesses.

Read More arrow-right-tertiary

09/14/2022

Former Conti Ransomware Members, Tools Linked To Initial Access Broker Targeting Ukraine

Five attack campaigns conducted against Ukrainian government agencies and businesses this spring and summer.
Read More arrow-right-tertiary

09/13/2022

Lawsuit after KeyBank breach heralds potential changes in cyber liability

Just days after KeyBank publicly announced late last Friday that an untold number of its mortgage customers had their information stolen.

Read More arrow-right-tertiary

09/12/2022

OpenAPIs and Third-Party Risks

With APIs, details and specifics are vital. Each API usually takes in very specific requests in a very specific format and returns very specific information.

Read More arrow-right-tertiary

09/09/2022

Contrast Security’s Jeff Williams discusses challenges in application security

Jeff Williams, Co-Founder & CTO for Contrast Security, shares his insights on the challenges agencies face with application security. 

Read More arrow-right-tertiary

Experience Contrast today

Schedule a one-to-one demo to see what Contrast Runtime Security can do for you