Latest news with #ContrastSecurity


Techday NZ
5 days ago
- Business
- Techday NZ
Tanium names Tara Ryan as Chief Marketing Officer for growth
Tanium has named Tara Ryan as its new Chief Marketing Officer as the company embarks on its next phase of expansion in autonomous endpoint management. Ryan brings more than 25 years of experience to Tanium, where she will be responsible for overseeing brand, corporate marketing, global communications, and demand generation. Her background includes senior marketing roles with high-growth technology firms and a track record of supporting companies as they navigate the challenges of rapid scaling, initial public offerings, and brand evolution. Most recently, Ryan served as Chief Marketing Officer at Saviynt, leading marketing for the company's AI-driven Identity Cloud platform. In this role, she worked on repositioning the brand in the competitive identity-centric cybersecurity market. Previously, Ryan was CMO at Contrast Security, where she contributed to the adoption of modern approaches to application security. Before that, at Incorta, she led marketing for a unified data platform designed to enable real-time operational decision-making. Her experience also includes prominent roles during pivotal growth stages at Proofpoint, Coupa, and NetSuite, where she built data-driven marketing programmes to support predictable pipeline and revenue growth. Earlier in her career, Ryan was part of brand and go-to-market initiatives at Network Associates, and Commerce One, where she played a role in multiple IPOs and managed cross-unit marketing strategies. Leadership perspectives Dan Streetman, Chief Executive Officer at Tanium, commented on the appointment, noting the alignment between Ryan's experience and the company's ambitions. "Tara is a transformational marketing leader with a unique blend of creativity, strategic acumen, and operational rigor. She's helped category-defining companies navigate growth, brand evolution, and market leadership. Her experience in cloud platforms, cybersecurity, and enterprise software makes her the ideal leader to scale our marketing efforts globally." In joining Tanium, Ryan is tasked with driving global brand transformation and supporting growth objectives as the company continues to provide its platform to a base that includes 34 million endpoints and 40% of the Fortune 100. Ryan expressed her perspective on the appointment and the position she sees Tanium holding within the market. "Tanium created new standards for enterprise IT and security teams far ahead of others and that innovation is paying off today for customers that need operational speed, compliance and resiliency. I am honored that Tanium chose me to take their brand to the next level and expand awareness of these amazing solutions." Company context Tanium describes its autonomous endpoint management solution as comprehensive, covering asset discovery, inventory, endpoint management, vulnerability management, risk and compliance, threat hunting, incident response and digital employee experience. The company says its platform supports operations for a diverse international customer base, including large commercial enterprises. Ryan's appointment is seen by the company as a key move to help further its growth strategy, expand brand recognition globally, and support efforts to deliver operational efficiency and security outcomes for customers seeking certainty in their IT operations.


Techday NZ
12-06-2025
- Business
- Techday NZ
Contrast Northstar brings real-time AI to application security
Contrast Security has announced the general availability of its new platform, Northstar, aimed at providing a unified application security experience for development, AppSec, and security operations teams. The Northstar release introduces features which allow teams to monitor application-layer attacks in real time, mitigate breaches, and remediate vulnerabilities using artificial intelligence within minutes, according to the company. The Contrast Graph Central to the platform is the Contrast Graph, which creates a digital twin of an organisation's application and API environment. The Graph maps live attack paths, monitors runtime behaviour, and visualises the connection between vulnerabilities, threats, and system assets to facilitate prioritisation and remediation. The company states that this live, dynamic context is intended to "eliminate the guesswork that plagues traditional tools" by focusing efforts on actual risk and allowing targeted, automated responses. Contrast's approach combines runtime data, contextual analysis, and AI-enabled auto-remediation in an effort to reduce noise and enable precise responses. Tyler Shields, Principal Analyst at Enterprise Strategy Group, said: "Connecting security operations processes with application security incident and vulnerability detection capabilities is a significant step towards breaking down the silos that exist between developers, application security, and security operations teams. This broad contextual analysis offering lends itself well to advanced AI-based prioritisation and automated remediation, which are the key security outcomes required by security organisations today." Runtime intelligence The Northstar release is designed to give Security Operations and AppSec teams a real-time understanding of application-layer threats as they occur. Active vulnerabilities can be auto-remediated with the new Contrast AI functionality, using live context and dynamic risk scoring to support decision making. The unified platform offers different views tailored to specific roles, so that developers can focus on prioritising remediation while SOC teams can identify and act on the most critical threats. Martha Gamez-Smith, Information Security Officer at Texas Computer Cooperative | Education Service Center, Region 20, commented: "We are excited to see the new features and feel that Contrast is set apart from other competitors, beyond reach. It makes our jobs better and easier. The real data will allow our team to take action more efficiently." Contrast Northstar pairs runtime intelligence with automation, and aims to streamline how organisations defend software against evolving risks by providing a shared perspective for development, security, and operational teams. Unified user experience The new release delivers a visual experience built around the Contrast Graph, providing real-time visibility into attacks, vulnerabilities, and business risks. These views can be tailored for each team and integrated with existing developer, CNAPP, and SIEM tools. The Contrast Graph functions as a live map, helping teams to better understand the relationships between vulnerabilities, threats, and assets to enable collaborative response. Key features Northstar features dynamic risk scoring that prioritises vulnerabilities based on their context in production, including architecture, threats, and business risk. The platform unifies Application Detection and Response (ADR) with Application Security Testing (AST), providing shared context for incident and vulnerability correlation. This aims to break down silos between teams and improve the speed and accuracy of threat resolution. The Contrast AI SmartFix capability utilises Graph data to generate specific remediation plans, write code, create test scripts, and draft pull requests. The Contrast MCP Server makes runtime insights available across environments, supporting future AI-driven use cases. The Deployment Hub is designed to simplify onboarding and the roll-out of updates across complex environments, helping organisations to deploy protection faster. The Flex Agent streamlines the process of agent deployment and updates, requiring no manual configuration and lessening installation times. Northstar integrates with established security products such as Splunk, Wiz, and Sumo Logic, and the company says that additional integrations and strategic partnerships will be announced in the coming weeks. Discussing the release, Jeff Williams, OWASP Founder, and Contrast Security Founder and CTO, said, "Northstar is the culmination of everything we've learned about defending modern software. We didn't just bolt together another set of tools—we reimagined AppSec from first principles. By combining runtime observability, real-time graph context, and AI-powered automation, we built a platform that doesn't just find problems—it understands them, prioritises them, and helps teams fix them fast. This is the platform I've wanted since OWASP's earliest days—one that doesn't just generate alerts, but actually defends the software that powers our world." The Northstar release is now available to partners and enterprises looking to update their application security programmes via a unified, real-time security operations and remediation toolset. Additional partnerships and integrations are set to follow in the coming weeks.


Associated Press
09-06-2025
- Business
- Associated Press
Contrast Introduces the First Unified Platform to See Application-Layer Attacks, Stop Breaches, and Remediate Vulnerabilities with AI
PLEASANTON, Calif.--(BUSINESS WIRE)--Jun 9, 2025-- Contrast Security, the global leader in Application Detection and Response (ADR), today announced the general availability of Northstar, a major release for the company that redefines how businesses see cyberattacks, stop breaches, and protect their applications and APIs. This is the industry's first platform to unite developers, security, and operations teams through an integrated user experience. Contrast pairs runtime data and contextual analysis with AI-powered auto-remediation to cut response times and eliminate noise, marking a breakthrough in application-layer security. The Contrast Graph: Live Runtime Insight That Drives Precision At the core of the platform is the Contrast Graph, which powers its most advanced capabilities, including optional agentic AI workflows that help teams respond faster and fix smarter. The Contrast Graph builds a real-time digital twin of an organization's application and API environment, mapping live attack paths, correlating runtime behavior, and exposing how vulnerabilities, threats, and assets are connected. This deep, dynamic context eliminates the guesswork that plagues traditional tools, enabling accurate, automated prioritization and remediation - so teams can focus on real risk and act with confidence. Tyler Shields, Principal Analyst at Enterprise Strategy Group, says, 'Connecting security operations processes with application security incident and vulnerability detection capabilities is a significant step towards breaking down the silos that exist between developers, application security, and security operations teams. This broad contextual analysis offering lends itself well to advanced AI-based prioritization and automated remediation, which are the key security outcomes required by security organizations today.' Runtime Intelligence That Sees, Stops, and Solves With the Northstar release, Security Operations and AppSec teams can, for the first time, see application-layer attacks as they happen, stop them instantly, and auto-remediate active vulnerabilities with the new Contrast AI. These capabilities leverage Contrast's powerful real-time context - paired with dynamic risk scoring that reflects exploitability, impact, and live attack activity, so teams always know where to focus. The unified platform provides views that are tailored to each role, enabling developers to prioritize remediation while SOC teams zero in on the most critical threats to limit damage. 'We are excited to see the new features and feel that Contrast is set apart from other competitors, beyond reach. It makes our jobs better and easier. The real data will allow our team to take action more efficiently,' said Martha Gamez-Smith CISSP, PMP, SSCP, Information Security Officer - Texas Computer Cooperative | Education Service Center, Region 20. Jeff Williams, an OWASP Founder, Contrast Security Founder and CTO, said, 'Northstar is the culmination of everything we've learned about defending modern software. We didn't just bolt together another set of tools—we reimagined AppSec from first principles. By combining runtime observability, real-time graph context, and AI-powered automation, we built a platform that doesn't just find problems—it understands them, prioritizes them, and helps teams fix them fast. This is the platform I've wanted since OWASP's earliest days—one that doesn't just generate alerts, but actually defends the software that powers our world.' ContrastNorthstarRelease Highlights: A Unified Perspective, Tailored for Every Team Contrast delivers a new visual user experience built around the Contrast Graph, giving Dev, Sec, and Ops teams real-time visibility into attacks, vulnerabilities, and business risk - all in views tailored to their roles and integrated into the developer, CNAPP, and SIEM solutions they use every day. The Contrast Graph acts as a live map of the application and API environment, showing how vulnerabilities, threats, and assets are connected so teams can act faster, together. Focus on What Matters Most Dynamic Risk Scoring: Continuously prioritizes vulnerabilities with architectural, threat, and business context based on real-world observations in production - so defenders can fix what's actually at risk. Unified ADR + AST: Bring together Application Detection and Response and Application Security Testing to break down silos across development, AppSec, and SecOps with shared context that connects incidents to vulnerabilities, aligning teams around real threats and faster resolution. Agentic AI That's Context-Aware Contrast AI SmartFix: Uses Contrast Graph data to generate fix plans, write code, create test scripts, and draft pull requests, dramatically reducing remediation time. Contrast MCP Server: Opens up access to Contrast's runtime insights - starting with vulnerability data and designed to support future agentic AI use cases. Faster Rollouts. Easier Management. Deployment Hub: Simplifies onboarding and managing updates across complex, distributed environments, speeding time to protection. Flex Agent: Streamlines agent deployment and updates at scale with no manual configuration required, simplifying installation and reducing setup time. Availability and Ecosystem Momentum The Contrast Northstar release is available today, delivering immediate value to both partner ecosystems and enterprise organizations looking to modernize their application security programs. Contrast integrates seamlessly with industry-leading tools like Splunk, Wiz, and Sumo Logic to ensure that security insights flow into the platforms teams already rely on. Additional integrations and strategic partnerships will be announced in the coming weeks, as Contrast continues to expand its global partners and redefine application-layer defense. To experience Contrast Northstar's release, go to: About Contrast Security Contrast Security is the global leader in Application Detection and Response (ADR), empowering organizations to see and stop attacks on applications and APIs in real time. Contrast embeds patented threat sensors directly into the software, delivering unmatched visibility and protection. With continuous, real-time defense, Contrast uncovers hidden application-layer risks that traditional solutions miss. Contrast's powerful Runtime Security technology equips developers, AppSec teams and SecOps with one platform that proactively protects and defends applications and APIs against evolving threats. View source version on CONTACT: Media Contact: Jake Milstein 206 718 9602 [email protected] KEYWORD: UNITED STATES NORTH AMERICA CALIFORNIA INDUSTRY KEYWORD: DATA MANAGEMENT SECURITY APPS/APPLICATIONS TECHNOLOGY SOFTWARE ARTIFICIAL INTELLIGENCE SOURCE: Contrast Security Copyright Business Wire 2025. PUB: 06/09/2025 06:00 AM/DISC: 06/09/2025 05:58 AM


Business Wire
09-06-2025
- Business
- Business Wire
Contrast Introduces the First Unified Platform to See Application-Layer Attacks, Stop Breaches, and Remediate Vulnerabilities with AI
PLEASANTON, Calif.--(BUSINESS WIRE)-- Contrast Security, the global leader in Application Detection and Response (ADR), today announced the general availability of Northstar, a major release for the company that redefines how businesses see cyberattacks, stop breaches, and protect their applications and APIs. This is the industry's first platform to unite developers, security, and operations teams through an integrated user experience. Contrast pairs runtime data and contextual analysis with AI-powered auto-remediation to cut response times and eliminate noise, marking a breakthrough in application-layer security. The Contrast Graph: Live Runtime Insight That Drives Precision At the core of the platform is the Contrast Graph, which powers its most advanced capabilities, including optional agentic AI workflows that help teams respond faster and fix smarter. The Contrast Graph builds a real-time digital twin of an organization's application and API environment, mapping live attack paths, correlating runtime behavior, and exposing how vulnerabilities, threats, and assets are connected. This deep, dynamic context eliminates the guesswork that plagues traditional tools, enabling accurate, automated prioritization and remediation - so teams can focus on real risk and act with confidence. Tyler Shields, Principal Analyst at Enterprise Strategy Group, says, 'Connecting security operations processes with application security incident and vulnerability detection capabilities is a significant step towards breaking down the silos that exist between developers, application security, and security operations teams. This broad contextual analysis offering lends itself well to advanced AI-based prioritization and automated remediation, which are the key security outcomes required by security organizations today.' Runtime Intelligence That Sees, Stops, and Solves With the Northstar release, Security Operations and AppSec teams can, for the first time, see application-layer attacks as they happen, stop them instantly, and auto-remediate active vulnerabilities with the new Contrast AI. These capabilities leverage Contrast's powerful real-time context - paired with dynamic risk scoring that reflects exploitability, impact, and live attack activity, so teams always know where to focus. The unified platform provides views that are tailored to each role, enabling developers to prioritize remediation while SOC teams zero in on the most critical threats to limit damage. "We are excited to see the new features and feel that Contrast is set apart from other competitors, beyond reach. It makes our jobs better and easier. The real data will allow our team to take action more efficiently," said Martha Gamez-Smith CISSP, PMP, SSCP, Information Security Officer - Texas Computer Cooperative | Education Service Center, Region 20. Jeff Williams, an OWASP Founder, Contrast Security Founder and CTO, said, 'Northstar is the culmination of everything we've learned about defending modern software. We didn't just bolt together another set of tools—we reimagined AppSec from first principles. By combining runtime observability, real-time graph context, and AI-powered automation, we built a platform that doesn't just find problems—it understands them, prioritizes them, and helps teams fix them fast. This is the platform I've wanted since OWASP's earliest days—one that doesn't just generate alerts, but actually defends the software that powers our world.' Contrast Northstar Release Highlights: A Unified Perspective, Tailored for Every Team Contrast delivers a new visual user experience built around the Contrast Graph, giving Dev, Sec, and Ops teams real-time visibility into attacks, vulnerabilities, and business risk - all in views tailored to their roles and integrated into the developer, CNAPP, and SIEM solutions they use every day. The Contrast Graph acts as a live map of the application and API environment, showing how vulnerabilities, threats, and assets are connected so teams can act faster, together. Focus on What Matters Most Dynamic Risk Scoring: Continuously prioritizes vulnerabilities with architectural, threat, and business context based on real-world observations in production - so defenders can fix what's actually at risk. Unified ADR + AST: Bring together Application Detection and Response and Application Security Testing to break down silos across development, AppSec, and SecOps with shared context that connects incidents to vulnerabilities, aligning teams around real threats and faster resolution. Agentic AI That's Context-Aware Contrast AI SmartFix: Uses Contrast Graph data to generate fix plans, write code, create test scripts, and draft pull requests, dramatically reducing remediation time. Contrast MCP Server: Opens up access to Contrast's runtime insights - starting with vulnerability data and designed to support future agentic AI use cases. Faster Rollouts. Easier Management. Deployment Hub: Simplifies onboarding and managing updates across complex, distributed environments, speeding time to protection. Flex Agent: Streamlines agent deployment and updates at scale with no manual configuration required, simplifying installation and reducing setup time. Availability and Ecosystem Momentum The Contrast Northstar release is available today, delivering immediate value to both partner ecosystems and enterprise organizations looking to modernize their application security programs. Contrast integrates seamlessly with industry-leading tools like Splunk, Wiz, and Sumo Logic to ensure that security insights flow into the platforms teams already rely on. Additional integrations and strategic partnerships will be announced in the coming weeks, as Contrast continues to expand its global partners and redefine application-layer defense. To experience Contrast Northstar's release, go to: About Contrast Security Contrast Security is the global leader in Application Detection and Response (ADR), empowering organizations to see and stop attacks on applications and APIs in real time. Contrast embeds patented threat sensors directly into the software, delivering unmatched visibility and protection. With continuous, real-time defense, Contrast uncovers hidden application-layer risks that traditional solutions miss. Contrast's powerful Runtime Security technology equips developers, AppSec teams and SecOps with one platform that proactively protects and defends applications and APIs against evolving threats.


Time of India
21-04-2025
- Business
- Time of India
Countries shore up their digital defenses as global tensions raise the threat of cyberwarfare
Hackers linked to Russia's government launched a cyberattack last spring against municipal water plants in rural Texas. At one plant in Muleshoe, population 5,000, water began to overflow. Officials had to unplug the system and run the plant manually. The hackers weren't trying to taint the water supply. They didn't ask for a ransom. Authorities determined the intrusion was designed to test the vulnerabilities of America's public infrastructure. It was also a warning: In the 21st century, it takes more than oceans and an army to keep the United States safe. A year later, countries around the world are preparing for greater digital conflict as increasing global tensions and a looming trade war have raised the stakes - and the chances that a cyberattack could cause significant economic damage, disrupt vital public systems, reveal sensitive business or government secrets, or even escalate into military confrontation. The confluence of events has national security and cyber experts warning of heightened cyberthreats and a growing digital arms race as countries look to defend themselves. At the same time, President Donald Trump has upended America's digital defenses by firing the four-star general who led the National Security Agency, shrinking cybersecurity agencies and slashing election cybersecurity initiatives. Live Events Businesses now are increasingly concerned about cyberattacks, and governments have moved to a war footing, according to a report this month by NCC Group, a British cybersecurity firm. Discover the stories of your interest Blockchain 5 Stories Cyber-safety 7 Stories Fintech 9 Stories E-comm 9 Stories ML 8 Stories Edtech 6 Stories "The geopolitical dust is still settling," said Verona Johnstone-Hulse, a London-based expert on government cybersecurity polices and the report's co-author. "What the new normal looks like is still not yet set." Many in the US are already calling for a more muscular approach to protecting the digital frontier. "Hybrid war is here to stay," said Tom Kellermann, senior vice president of cyberstrategy at Contrast Security. "We need to stop playing defense - it's time to make them play defense." Digital life means more targets for hackers Vulnerabilities have grown as people and businesses use connected devices to count steps, manage finances and operate facilities such as water plants and ports. Each network and connection is a potential target for foreign governments or the hacking groups that sometimes do their bidding. Espionage is one motive, demonstrated in a recent incursion linked to hackers in China. The campaign known as Salt Typhoon sought to crack the phones of officials, including Trump, before the 2024 election. These operations seek entry to sensitive corporate or government systems to steal secrets or monitor personal communications. Such information can be hugely valuable by providing advantages in trade negotiations or military planning. These hackers try to remain hidden for as long as possible. More obvious intrusions can serve as a warning or deterrent, such as the cyberattacks targeting the Texas water plants. Iran also has shown a willingness to use cyberattacks to make political points. The cyberattacks that frighten experts the most burrow deeply into telephone or computer networks, inserting backdoors or malware for later use. National security experts say this was the motivation behind a recent attack from China called Volt Typhoon that compromised telephone networks in the U.S. in an effort to gain access to an unknown number of critical systems. China could potentially use these connections to disable key infrastructure - power plants, communication networks, pipelines, hospitals, financial systems - as part of a larger conflict or before an invasion of Taiwan, national security experts said. "They can position their implants to be activated at a date and time in the future," said Sonu Shankar, a former researcher at Los Alamos National Laboratory who is now chief strategy officer at Phosphorus Cybersecurity. National security officials will not discuss details, but experts interviewed by The Associated Press said the U.S. no doubt has developed similar offensive capabilities. China has rejected US allegations of hacking, accusing America of trying to " smear " Beijing while conducting its own cyberattacks. Global tensions tick up Wars in Ukraine and the Middle East. Trade disputes. Shifting alliances. The risk of cyberattacks goes up in times of global tension, and experts say that risk is now at a high. US adversaries China, Russia, Iran and North Korea also have shown signs of cybercooperation as they forge tighter economic, military and political relationships. Speaking to Congress, Director of National Intelligence Tulsi Gabbard noted that Iran has supplied drones in exchange for Russian intelligence and cybercapabilities. "Russia has been the catalyst for much of this expanded cooperation, driven heavily by the support it has needed for its war effort against Ukraine," Gabbard told lawmakers. Amid global fears of a trade war after the tariffs that Trump has imposed, supply chains could be targeted in retaliation. While larger companies may have a robust cyberteam, small suppliers that lack those resources can give intruders easy access. And any tit-for-tat cycles of cyberconflict, in which one country hacks into a sensitive system as retaliation for an earlier attack, come with "great risk" for all involved, Shankar said. "It would put them on the path to military conflict." The Trump effect At a time when national security and cybersecurity experts say the U.S. should be bolstering its defenses, Trump has called for reductions in staffing and other changes to the agencies that protect American interests in cyberspace. For example, Trump recently fired Gen. Timothy Haugh, who oversaw the NSA and the Pentagon's Cyber Command. The U.S. faces "unprecedented cyber threats," said Virginia Sen. Mark Warner , the top Democrat on the Senate Intelligence Committee. He has asked the White House to explain Haugh's departure. "How does firing him make Americans any safer?" Warner said. Also under Trump, the U.S. Cybersecurity and Infrastructure Security Agency placed on leave staffers who worked on election security and cut millions of dollars in funding for cybersecurity programs for local and state elections. His administration eliminated the State Department's Global Engagement Center, which tracked and exposed foreign disinformation online. The CIA, NSA and other intelligence agencies also have seen reductions in staffing. The administration faced more questions over how seriously it takes cybersecurity after senior officials used the popular messaging app Signal to discuss sensitive information about upcoming military strikes in Yemen. Gabbard later called the episode a mistake. The officials in charge of America's cybersecurity insist Trump's changes will make the U.S. safer, while getting rid of wasteful spending and confusing regulations. The Pentagon, for instance, has invested in efforts to harness artificial intelligence to improve cyberdefenses, according to a report provided to Congress by Lt. Gen. William J. Hartman, acting commander of the NSA and Cyber Command. The changes at the Cybersecurity and Infrastructure Security Agency come as its leaders consider how best to execute their mission in alignment with the administration's priorities, a CISA statement said. "As America's Cyber Defense Agency, we remain steadfast in our mission to safeguard the nation's critical infrastructure against all cyber and physical threats," the statement read. "We will continue to collaborate with our partners across government, industry, and with international allies to strengthen global cybersecurity efforts and protect the American people from foreign adversaries, cybercriminals, and other emerging threats." Representatives for Gabbard's office and the NSA didn't respond to questions about how Trump's changes will affect cybersecurity. Signs of progress? Despite shifting alliances, a growing consensus about cyberthreats could prompt greater global cooperation. More than 20 nations recently signed on to an international framework on the use of commercial spyware. The U.S. has signaled it will join the nonbinding agreement. There's also broad bipartisan agreement in the U.S. about the need to help private industry bolster defenses. Federal estimates say the cybersecurity industry needs to hire an additional 500,000 professionals to meet the challenge, said Dean Gefen, former chief of cybertraining for Israel's Defense Intelligence Technological Unit. He's now the CEO of NukuDo, a cybersecurity training company. "Companies need effective guidance from the government - a playbook," Gefen said. "What to do, what not to do."