Skip to content

Contrast Marketing

Subscribe Now
    Topics

    Why Blue Teams Need RASP: Continuous Application Threat Monitoring with Runtime Exploit Prevention

    Runtime Application Self-Protection (RASP) adds threat visibility and security control to application runtimes so you..

    Likelihood of vulnerabilities and attacks

    October 2019 AppSec Intelligence Report

    This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from October..

    Let’s Talk About Sec — Making Impactful Security Updates to the Board of Directors

    In 2019, for many businesses, experiencing a security breach is not a matter of if, but of when.

    3 Steps to Manage Vulnerabilities. Lessons from Surviving a Zombie Infestation.

    Whether you’re scoping out your strategic survival plan in the event of a potential Zombie Apocalypse or drafting up..

    % of applications affected by OWASP TOP 10

    Two Years After the Release of the 2017 OWASP Top Ten, Limited Improvements Shown

    Contrast Labs finds that 71% of applications have at least one OWASP Top Ten vulnerability when onboarded to Contrast..

    Elite Performers CHoose Simpler Tools

    Elite Performers Choose Simpler Tools

    I was fascinated to read this year’s Accelerate State of DevOps Report 2019 which now represents six years of research..

    Screen Shot 2019-10-17 at 1.15.28 PM

    September 2019 APPSEC INTELLIGENCE REPORT

    This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from September..

    process-zip-files

    Pulling Back the Curtain On: Zip File Overwrites

    Zip file overwrites are a cool but rare vulnerability that can occur on apps that work with user-supplied zip files...

    August Image 1

    August 2019 AppSec Intelligence Report

    This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from August..