Skip to content

Contrast Marketing

Subscribe Now
    Topics
    process-zip-files

    Pulling Back the Curtain On: Zip File Overwrites

    Zip file overwrites are a cool but rare vulnerability that can occur on apps that work with user-supplied zip files...

    August Image 1

    August 2019 AppSec Intelligence Report

    This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from August..

    signature-binary

    Pulling Back the Curtain on RASP

    If you set out to build a new WAF today (which, believe it or not, people are still doing), everyone would have some..

    Contrast Security Recognized as a Gartner Peer Insights Customers' Choice for Application Security Testing

    In the 2019 Gartner Peer Insights ‘Voice of the Customer’ Contrast Security received:

    July 2019 AppSec Intelligence Report: Attack Edition

    July 2019 AppSec Intelligence Report: Attack Edition

    July 2019 AppSec Intelligence Report: Attack Edition

    Coalfire PCI Compliance & Contrast Security

    Contrast Assess and Protect recently went through an independent evaluation by CoalFire, a respected Payment Card..

    June 2019 AppSec Intelligence Report: Attack Edition

    What is this report: This report summarizes Contrast Labs' analysis of real world application attack data from June..

    Stoked! The Creative Process of Street Skating and What Open Source Folks Can Learn From It

    “…all skateboarders speak a language of our own devising. We take simple movements and chunk them together in such a..

    Contrast Protect + WAF: A Day in the Life of a User

    A Web Application Firewall can watch network data, but the architecture does not enable them to see how that data is..