Skip to content

Contrast Marketing

Subscribe Now
    Topics

    Contrast Security Honored as a Silver Stevie® Award Winner in the 2019 American Business Awards® for Best Business Technology Software - DevOps Solution

    We are proud to announce that Contrast Security has been named a Silver Stevie Award winner for Best Business..

    How do teams stay afloat in an ocean of vulnerabilities? They remediate faster (3.0x FASTER!)

    As a developer, working through your team's bug backlog can sometimes feel like bailing out a rowboat with only a leaky..

    Contrast Security Recognized as the only "Visionary" in the Gartner Magic Quadrant for Application Security Testing for 2019

    Gartner just released its new Magic Quadrant (MQ) for Application Security Testing (AST) for 2019. Gartner evaluates..

    waf-blog-post

    Top 5 Challenges Securing Applications with Web Application Firewalls

    Application Security teams have very few options when it comes to defending their applications in production...

    Cyber Defense Magazine InfoSec Awards Honors Contrast Security as Editor's Choice in Application Security

    We are excited to announce that at RSA last week, Cyber Defense Magazine InfoSec Awards honored Contrast Security as a..

    D0285ZTUwAIZdJQ

    "BETTER" Security in 2019 - Lessons from RSA

    We’ve recently wrapped up a dynamic week at RSA 2019 in San Francisco where we had over 500 visitors to our booth,..

    Robin hi res1 copy

    Contrast Security Named Winner in the 15th Annual Info Security PG's 2019 Global Excellence Awards®

    We are pleased to announce that Info Security Products Guide, the industry's leading information security research and..

    erikHeadshot-126710-edited

    Contrast Security is Fully Compatible with Amazon Corretto

    Amazon recently released Corretto, a Java 8 runtime that is fully-compatible and license-compliant. Both Contrast..

    FLAG_IQT

    Contrast Security and In-Q-Tel Strategic Partnership & Development Agreement: Bolstering Cybersecurity with Continuous Application Security at Scale