Skip to content

Contrast Marketing

Subscribe Now
    Topics
    The VAR Guy: When It Comes to Cybersecurity, Both Candidates Disappoint

    The VAR Guy: When It Comes to Cybersecurity, Both Candidates Disappoint

    Last night’s presidential debate raised a lot of eyebrows on a multitude of subjects. This morning, everyone has an..

    Application Security Integrations: Start Slacking!

    Application Security Integrations: Start Slacking!

    If you’re one of the three million daily active users of Slack, then chat based-collaboration is something that is very..

    Library-Security-1.jpg

    How Can Devs Keep Up with the Library Security Devil?

    So, you don’t have the budget to buy Contrast, but you want your developers to be on top of the security of your open..

    Arc-blue_logo.jpg

    Insights from a CISO: Compliance & Application Security

    Contrast interviews folks who are "Security Influencer's" and then shares their knowledge via online media. We see..

    IAST & the Villainous Library Named

    IAST & the Villainous Library Named "commons-httpclient-3.1.jar"

    Let’s talk about commons-httpclient-3.1.jar. I get asked about this library all the time. It’s an HTTP communication..

    Insecure Code: TechBeacon Talks Dangerous Code & Programming Missteps

    Insecure Code: TechBeacon Talks Dangerous Code & Programming Missteps

    This week, Erik Sherman of TechBeacon mentioned Jeff Williams, Contrast Security CTO and Co-Founder, in an article on..

    The Most Important Elements of Data & Application Security

    The Most Important Elements of Data & Application Security

    DZone recently interviewed 19 application and data security executives to gather insights and trends and business..

    How Secure Are Your Third-Party Libraries?

    Does your current AppSec tool provide you with the visibility and control you need? Unlike legacy solutions, Contrast..

    Integrations Make Managing AppSec Even Easier!

    Integrations Make Managing AppSec Even Easier!

    At Contrast Security, we believe that application security should be pervasive and transparent. Application security..