What is DORA? | Compliance Requirements for EU DORA Regulations | Contrast Security

What is DORA? | Compliance Requirements for EU DORA Regulations | Contrast Security

Cyberattacks, supply-chain issues, flooding, tsunamis, wildfires, equipment failures and even war: The financial sector has no choice but to keep operations running through all these — among other — types of disruptions, ...

Zero Reasons not to Move to Zero Trust with RASP

What is Zero Trust?  Zero Trust is a security methodology that enterprises are rapidly adopting to enhance data protection by reducing the sole reliance on traditional perimeter-based protections.  Traditionally, cybersecurity strategies have ...
Using RASP to Protect Applications and Comply with the PCI DSS

Using RASP to Protect Applications and Comply with the PCI DSS

Public-facing web applications are ripe targets for attackers. These applications need security to protect against attacks as well as identify […] ...
Log4j still an issue, but CodeSec audit can help

Log4j vulnerabilities still an issue, but CodeSec audit can help | Contrast Security

Landing on the incident response boards for software engineering teams worldwide in December 2021, the Log4j vulnerabilities in Java software remain a real concern for developers more than 9 months later.Apache Log4j ...
Building a modern API security strategy — API protection

Building a modern API security strategy — API protection

| | API security, APIs, rasp
Part four of the five-part series, Building a modern API security strategy ...
Debunking the myths around RASP

Debunking myths around RASP (Runtime Application Self-Protection) technology

Welcome to the second part of this series examining some of the myths that I’ve heard in many conversations around Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) while working ...
The Need for Deterministic Security

More than 40 billion records exposed in 2021

Security Brief Asia is reporting on new research showing more than 40 billion records were exposed by data breaches in 2021. According to the research from Tenable's Security Response Teams, they found ...
The Need for Deterministic Security

A Quick Look at the New OWASP Top 10 for 2021

Back in September of 2021 we wrote that the OWASP working group had a draft of latest Top 10 Web Application Security Risks, their first update since the 2017 revision.  The working ...
The Final Count: Vulnerabilities Up Almost 10% in 2021

The Final Count: Vulnerabilities Up Almost 10% in 2021

ow that 2021 has ended, we can see the final tally of vulnerabilities recorded for 2021.  The year ended with a total of 20,061 vulnerabilities recorded, 9.3% over the prior year and ...
The Need for Deterministic Security

93% of Tested Networks Vulnerable to Breach

Nearly every organization can be infiltrated by cyber attackers, based on data from dozens of penetration tests and security assessments. The vast majority of businesses can be compromised within a month by ...