Skip to content

Lisa Vaas, Senior Content Marketing Manager, Contrast Security

Lisa Vaas is a content machine, having spent years churning out reporting and analysis on information security and other flavors of technology. She’s now keeping the content engines revved to help keep secure code flowing at Contrast Security.

Subscribe Now
    Topics
    ‘Assurance’ isn’t clearing the murky waters of software transparency

    ‘Assurance’ isn’t clearing the murky waters of software transparency

    Just what, exactly, is “assurance?”

    Even the Secret Service is blown away by cyberattacks on banks

    Even the Secret Service is blown away by cyberattacks on banks

    Twenty-four years ago, the World Bank was connecting all the central banks of the world to the internet, so as to..

    Report: How financial firms are fending off ransomware

    Report: How financial firms are fending off ransomware

    Banks, you’ve obviously been taking self-defense lessons, and it shows: The rate of financial institutions (FIs)..

    Report: Cybercrooks are after financial insider info

    Report: Cybercrooks are after financial insider info

    Why are cybercrime cartels ransacking financial institutions (FIs)?

    Report: Cyberattacks against financial sector surge 64%

    Report: Cyberattacks against financial sector surge 64%

    What ever happened to stealth?

    Partners, prepare for synergy & lots of lightbulb moments

    Partners, prepare for synergy & lots of lightbulb moments

    He’s calling it “revolutionary.”

    Devs, are you ready to put privacy nutrition labels on your code?

    Devs, are you ready to put privacy nutrition labels on your code?

    Happy new year to all of us whose eyes have crossed trying to read our cumulative (and ever-growing) ~1 million-word..

    Sussing out rusty security links in your software supply chain

    Sussing out rusty security links in your software supply chain

    Let’s talk about rusty supply chains. But first, let’s talk about chocolate.

    One year after Log4Shell, firms still struggle to hunt down Log4j

    One year after Log4Shell, firms still struggle to hunt down Log4j

    It’s been one year since a CVE identifier was made available for the infamous Log4j flaw — CVE-2021-44228, commonly..