risk prioritization

Cybersecurity Insights with Contrast CISO David Lindner | 06/06/25
Insight No. 1 — Fixing threat actor names Microsoft and CrowdStrike announced that they’ll work together on the headache of multiple names for the same threat actors. But what matters most is ...

Cybersecurity Insights with Contrast CISO David Lindner | 05/02/25
Insight No. 1 — Know which vulnerabilities are active in production Consider this: your pre-production scans might flag hundreds of vulnerabilities, but which ones are actually being exploited in your live environment? ...

Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities
Welcome to part three of our series with PlexTrac where we address data overload in vulnerability remediation. Join us as we preview the latest PlexTrac capabilities, including new ways to centralize asset ...

Cloud Security Risk Prioritization is Broken. Here’s How to Fix It.
Understanding business risk empowers CISOs to provide a comprehensive picture of the business’ cloud security posture, which will help teams detect, prioritize and remediate threats to stop cloud and app-related breaches ...

Managed Vulnerability Management? Yes, You Read That Right
The importance of a mature vulnerability management program can’t be overstated. File integrity monitoring (FIM) and security configuration management (SCM) might be the bedrock of a strong cybersecurity program, but they can ...