Contrast Security
Secure Code Warrior enhances partner program, extends DevSecOps vendors integrations
At its inaugural Global Partner Virtual Summit, Secure Code Warrior announced significant enhancements to its global partner program, as well as expanded integrations with …

Application security not a priority for financial services institutions
Contrast Security announced the findings of a report based on a comprehensive survey of development, operations, and security professionals and executives at enterprise-level …
Dasera appoints David McCaw as VP of Sales
Dasera announced the appointment of cybersecurity veteran David McCaw to the position of Vice President, Sales. In today’s cloud-first environments, data sprawl is …

New infosec products of the week: March 20, 2020
HYAS Insight: A threat intelligence solution for investigation and attribution HYAS Insight is a threat intelligence and attribution solution that improves visibility and …
Contrast Security simplifies DevSecOps with Route Intelligence
Contrast Security, the next-generation software security platform, announced Route Intelligence, a major new capability for application security. Legacy application security …

Malware and ransomware attack volume down due to more targeted attacks
Cybercriminals are leveraging more evasive methods to target businesses and consumers, a SonicWall report reveals. “Cybercriminals are honing their ability to design, …

Embedding security, the right way
As organizations proceed to move their processes from the physical world into the digital, their risk profile changes, too – and this is not a time to take risks. By not …

Custom code accounts for 93% of application vulnerabilities
Although third-party software libraries represent a majority of an application’s code, they account for less than seven percent of application vulnerabilities. Typically, …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility