Skip to content

Contrast Marketing

Subscribe Now
    Topics
    What Happens to Application Security When Your Apps Go to the Cloud?

    What Happens to Application Security When Your Apps Go to the Cloud?

    This article discusses the pros of applications moving to the cloud, the security dilemma’s surrounding the move, and..

    blog_apps111416.jpg

    The Impact of Fake Retail Apps Hitting the Apple App Store this Year

    Last week, App Developer Magazine, in an article titled "The Impact of Fake Retail Apps Hitting the Apple App Store..

    BlogFailuretoLognch1116.png

    Failure to Lognch

    I had to fight tooth and nail to get this blog title -- I hope it made you shoot air out of your nose with a little..

    The DevOpsification of Security

    In an article "The DevOpsification of Security," written by Redpoint Ventures principal Lenny Pruss, Contrast Security..

    sc_logo_21413_345884.png

    Poor Election Cybersecurity Abounds

    In an SC Magazine article published earlier this week, Larry Jaffee discusses the potential cybersecurity concerns of..

    DOM XSS in wix.com

    DOM XSS in wix.com

    Wix.com, a hosting provider which claims to host millions of websites, contains an XSS that leads to administrator..

    man computer

    Chat all you want… but will that data in your message be secure?

    Businesses are looking to tools to improve productivity — no surprise right. Business apps are not just “stand-alone”..

    TechTarget:

    TechTarget: "Getting runtime application self-protection launched"

    In this piece, Ed Tittle of TechTarget, dives into how, while runtime application self-protection is a mouthful, it’s..

    application-security-contrast.jpg

    Application Security: How Microsoft’s Chairman is Fighting Hackers

    "We've got to start to rethink the application security paradigm, not just the information security paradigm," Thompson..