Cybersecurity Insights with Contrast CISO David Lindner | 03/07/25

Cybersecurity Insights with Contrast CISO David Lindner | 03/07/25

Insight No. 1. — Ransomware groups are using CISA’s KEV catalog as a runbook  Given that CISA's Known Exploited Vulnerabilities (KEV) catalog highlights the most actively exploited and critical Common Vulnerabilities and ...
human, risk, error, open source security

Synopsys Report Exposes Extent of Open Source Software Security Risks

Synopsys found 74% of 1,067 commercial codebases scanned contain open source components impacted by high-risk vulnerabilities ...
Security Boulevard
open source security

Who Owns Open Source Security?

According to a recent report by the Internet Security Forum, open source software (OSS) is quickly becoming a pillar within enterprise infrastructure. In fact, OSS is now used in 99% of commercial ...
Security Boulevard
Developers Versus Automation Engineers: How We Ended the Fighting with the Right CI Process

Developers Versus Automation Engineers: How We Ended the Fighting with the Right CI Process

Hey developers and DevOps professionals: what if I told you that how you wrap and execute your automation tests could be the key to making your development process faster, more professional and ...
OSZAR »