Skip to content

Contrast Marketing

Subscribe Now
    Topics
    Experts: Why the Log4Shell Grinch is still hanging around

    Experts: Why the Log4Shell Grinch is still hanging around

    Three years ago, Log4Shell was the worst holiday gift ever for security teams, particularly given that it was wrapped..

    Log4Shell: Three years later & Log4j is still burning down the house

    Log4Shell: Three years later & Log4j is still burning down the house

    Three years ago this month, the security world found out about a massive vulnerability in the Log4j library. Log4Shell..

    November: The top attacks ADR caught on the brink of exploit

    November: The top attacks ADR caught on the brink of exploit

    Attackers targeted applications and application programming interfaces (APIs) with an average of 50 confirmed attacks..

    Ensuring vigilant digital transformation in the financial sector

    Ensuring vigilant digital transformation in the financial sector

    Financial services are at the crossroads of innovation and threats from ever-more sophisticated cybercriminals. “In my..

    Smarter AppSec: How ADR, secure by design and 'shift smart' are redefining cybersecurity

    Smarter AppSec: How ADR, secure by design and 'shift smart' are redefining cybersecurity

    If there’s one thing Jeff Williams learned from years and years of doing pen testing and threat modeling, it’s this:..

    Preparing for PCI DSS v4.0.1, the latest version of PCI

    Preparing for PCI DSS v4.0.1, the latest version of PCI

    The deadline to comply with the latest version of the Payment Card Industry Data Security Standard (PCI DSS), v4.0.1,..

    Bringing the application layer into cybersecurity monitoring and response

    Bringing the application layer into cybersecurity monitoring and response

    At long last, there’s a spotlight — Application Detection and Response (ADR) — that shines the light into what’s been a..

    Analyst: Application Detection and Response is an ‘emerging category’

    Analyst: Application Detection and Response is an ‘emerging category’

    One of the leading cybersecurity analyst firms is calling Application Detection and Response (ADR) an “emerging..

    Understanding ADR’s detection and response layers

    Understanding ADR’s detection and response layers

    Airport security is a lot like cybersecurity. Each is a cumbersome process aimed at protecting valuable assets. Both..