Skip to content

AppSec Observer: Hacked (4)

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Point of View: Senate Stalls Cybersecurity Bill

    Point of View: Senate Stalls Cybersecurity Bill

    The rush to "do something" about cyber security issues is leading both legislators in industry to ridiculous place...

    Point of View: Chrysler recalls 1.4 million hackable cars

    Point of View: Chrysler recalls 1.4 million hackable cars

    “The interesting thing about this recall is not that it’s going to be expensive and inconvenient (it will), but that it..

    Point of View: Tesla opens up bug bounty program

    Point of View: Tesla opens up bug bounty program

    “Bug bounty programs have been surprisingly effective and I don’t see this being any different for Tesla. I think..

    Point of View: Army's Public Website Hacked by Unknown Intruders

    Point of View: Army's Public Website Hacked by Unknown Intruders

    All breaches are not created equal. The Army breach is actually considerably more disturbing than the IRS breach.

    Point of View: Federal Personnel Data Breach

    Point of View: Federal Personnel Data Breach

    Government agencies are in serious danger from cyber threats. While many have a continuous network security program in..

    IRS Hackers stole $39M and effected 2.7 million taxpayers

    It’s easy to jump all over the IRS for a seemingly obvious security problem. Congress and reporters are calling for a..

    IRS hit by data breach exposing 100,000 records

    Read what Jeff Williams has to say about the data breach the IRS experienced exposing over 100,000 records. What can..

    We've Been Hacked. Our Data Was Breached. What Do I Do Now?

    We've Been Hacked. Our Data Was Breached. What Do I Do Now?

    We're Sorry You Got Hacked. First, if you just detected a data breach, you've been hacked, and you should probably stop..

    The Ankle Biters of the Application Security World

    The Ankle Biters of the Application Security World

    The playing field isn't exactly level, and ankle biters (aka script kiddies and hackers) know it. While businesses and..