Skip to content

Contrast Marketing

Subscribe Now
    Topics
    95% of Organizations Admit To at Least One Successful Application Exploit in Past Year

    95% of Organizations Admit To at Least One Successful Application Exploit in Past Year

    Findings and Insights from Contrast Security’s 2020 State of DevSecOps Report

    Application Security Risks Remain Elevated

    Application Security Risks Remain Elevated

    Highlights From Contrast Security's Bimonthly Application Security Intelligence Report The saying that “every company..

    Contrast’s Cloud Native Security Innovation Center Secures Next-generation Cloud Application Architecture

    Contrast’s Cloud Native Security Innovation Center Secures Next-generation Cloud Application Architecture

    In a recent report, Accenture notes that “organizations are finding that they have hit a wall when it comes to..

    Contrast Security’s Approach to SCA Enables Vulnerability Prioritization and Faster Remediation

    Contrast Security’s Approach to SCA Enables Vulnerability Prioritization and Faster Remediation

    Open Source Is a Mainstay in Modern Development It goes without saying that modern applications are rarely built from..

    Eating Our Own Cooking at Contrast: Securing and Protecting TeamServer

    Eating Our Own Cooking at Contrast: Securing and Protecting TeamServer

    It’s very rare that one has an opportunity to experience the development of a major software solution from the ground..

    Contrast Receives 4.8/5.0 in 2020 Gartner Peer Insights ‘Voice of the Customer’: AST Customers’ Choice

    Contrast Receives 4.8/5.0 in 2020 Gartner Peer Insights ‘Voice of the Customer’: AST Customers’ Choice

    Technology companies that fail at delivering unparalleled customer experiences and demonstrating business value simply..

    85% of Developers in the Technology Industry Deploy Daily, Yet 8 in 10 Aren’t Going Fast Enough

    85% of Developers in the Technology Industry Deploy Daily, Yet 8 in 10 Aren’t Going Fast Enough

    Organizations aspire to reach perfection and often look to emulate best practices of peer organizations to do so. When..

    Authenticated Remote Code Execution in OpenMRS

    Authenticated Remote Code Execution in OpenMRS

    Early in May of 2020, Contrast Labs was exploring different ways in which we could help the community or world combat..

    XML External Entity (XXE) Attack Vulnerability and JAXB Pitfalls

    XML External Entity (XXE) Attack Vulnerability and JAXB Pitfalls

    The Java XML Binding (JAXB) runtime that ships with OpenJDK 1.8 uses a default configuration that protects against XML..