Skip to content

Lisa Vaas, Senior Content Marketing Manager, Contrast Security

Lisa Vaas is a content machine, having spent years churning out reporting and analysis on information security and other flavors of technology. She’s now keeping the content engines revved to help keep secure code flowing at Contrast Security.

Subscribe Now
    Topics
    The top 8 AWS root user account best practices

    The top 8 AWS root user account best practices

    Amazon Web Services (AWS) has revolutionized the way organizations manage their IT infrastructure and applications...

    Contrast Security champions Cybersecurity Awareness Month: #SecureOurWorld

    Contrast Security champions Cybersecurity Awareness Month: #SecureOurWorld

    Contrast is once again proud to be a Champion for Cybersecurity Awareness Month throughout October, to help in..

    Learn about the hidden dangers of traditional AppSec tools and why Runtime Security is replacing them: podcast writeup

    Learn about the hidden dangers of traditional AppSec tools and why Runtime Security is replacing them: podcast writeup

    Are traditional AppSec tools keeping up with advances in software? That was the question The Application Security..

    Why we shouldn't treat the CVSS base score as gospel

    Why we shouldn't treat the CVSS base score as gospel

    On Sept. 6, Cisco issued an urgent fix for an authentication bypass flaw affecting the single sign-on (SSO)..

    3 reasons why upskilling the nation’s cybersec savvy won’t solve the skills gap

    3 reasons why upskilling the nation’s cybersec savvy won’t solve the skills gap

    The White House recently announced its new National Cyber Workforce and Education Strategy & Implementation (NCWES): a..

    Why OWASP’s CycloneDX will make you fall in love with SBOMs

    Why OWASP’s CycloneDX will make you fall in love with SBOMs

    It’s well-established: Triple-DES is a feeble encryption algorithm.

    3 crucial steps to inject security into DevOps

    3 crucial steps to inject security into DevOps

    According to a new report from Gartner titled3 Essential Steps to Enable Security in DevOps,by 2027, DevSecOps..

    Treat ALL data — not just PII — as if it’s regulated

    Treat ALL data — not just PII — as if it’s regulated

    Poor, poor Boston Globe.

    Why aren’t people patching the MOVEit bug?

    Why aren’t people patching the MOVEit bug?

    Know anything about CL0P, the ransomware gang connected to an attack on the popular MOVEit Transfer file-transfer..