Skip to content

Contrast Marketing

Subscribe Now
    Topics
    Mitigating the Risks of Open-source Software in DevOps

    Mitigating the Risks of Open-source Software in DevOps

    Speed matters when it comes to developing and releasing a new software title—nearly two-thirds of software companies..

    Getting Started with Contrast Security Community Edition for Java

    Getting Started with Contrast Security Community Edition for Java

    Traditional code scanning tools for application security (AppSec) bog down DevOps workflows and suffer from major..

    Open-Source Python Salt CVEs and the Cisco Server Breach

    Open-Source Python Salt CVEs and the Cisco Server Breach

    Hackers recently exploited two critical vulnerabilities (CVEs) in SaltStack’s "Salt" management framework in order to..

    Legacy SAST and the Fallacy of 100% Code Coverage

    Legacy SAST and the Fallacy of 100% Code Coverage

    In October of 2019, three months into my tenure at Contrast Security, I received a challenge question from a customer..

    Manual Application Vulnerability Management Delays Innovation While Increasing Business Risk

    Manual Application Vulnerability Management Delays Innovation While Increasing Business Risk

    Traditional approaches to application security (AppSec), such as legacy static application security testing (SAST) and..

    Contrast Security Further Expands Industry’s Broadest IAST Language Support with the Addition of Python Application Security

    Contrast Security Further Expands Industry’s Broadest IAST Language Support with the Addition of Python Application Security

    Python is one of the most widely used languages for web application development today. It’s a dynamic language that is..

    Accuracy in AppSec Is Critical to Reducing False Positives

    Accuracy in AppSec Is Critical to Reducing False Positives

    According to a new report from the Neustar International Security Council (NISC), over one-quarter of security alerts..

    Protect Sensitive Data, Reduce Risk, and Gain Regulatory Compliance with Embedded Data Security

    Protect Sensitive Data, Reduce Risk, and Gain Regulatory Compliance with Embedded Data Security

    Sensitive data often leaks out through applications. The privacy risk is not developer negligence, but rather misplaced..

    43% of Data Breaches Connected to Application Vulnerabilities: Assessing the AppSec Implications

    43% of Data Breaches Connected to Application Vulnerabilities: Assessing the AppSec Implications

    Web applications are a growing focus point for cyber criminals. Motivated by financial outcomes, they understand the..