Skip to content

Contrast Marketing

Subscribe Now
    Topics
    Contrast Security - Application Flow Map

    Why Application Flow Maps Are the Coolest Feature in Application Security

    Application flow maps are the cool feature you can use to discover that needle in a haystack—how does my running app..

    November 2019 AppSec Intelligence Report

    This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from November..

    Why Blue Teams Need RASP: Continuous Application Threat Monitoring with Runtime Exploit Prevention

    Runtime Application Self-Protection (RASP) adds threat visibility and security control to application runtimes so you..

    Likelihood of vulnerabilities and attacks

    October 2019 AppSec Intelligence Report

    This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from October..

    Let’s Talk About Sec — Making Impactful Security Updates to the Board of Directors

    In 2019, for many businesses, experiencing a security breach is not a matter of if, but of when.

    3 Steps to Manage Vulnerabilities. Lessons from Surviving a Zombie Infestation.

    Whether you’re scoping out your strategic survival plan in the event of a potential Zombie Apocalypse or drafting up..

    % of applications affected by OWASP TOP 10

    Two Years After the Release of the 2017 OWASP Top Ten, Limited Improvements Shown

    Contrast Labs finds that 71% of applications have at least one OWASP Top Ten vulnerability when onboarded to Contrast..

    Elite Performers CHoose Simpler Tools

    Elite Performers Choose Simpler Tools

    I was fascinated to read this year’s Accelerate State of DevOps Report 2019 which now represents six years of research..

    Screen Shot 2019-10-17 at 1.15.28 PM

    September 2019 APPSEC INTELLIGENCE REPORT

    This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from September..