Skip to content

Contrast Marketing

Subscribe Now
    Topics
    Why We Should Score Data Breaches

    Why We Should Score Data Breaches

    Contrast's CTO and Co-Founder, Jeff Williams, was interviewed by Forbes Magazine at Black Hat USA 2016 earlier this..

    LOGOdarkreading0716.png

    Jeff Williams Selected as Finalist for the Dark Reading’s Best of Black Hat Innovator Awards

    Our CTO and cofounder Jeff Williams has been selected as one of three finalists for Dark Reading’s Best of Black Hat..

    The Client Is Not Always Right!

    The Client Is Not Always Right!

    J’accuse! I often get the question, “How well does your product handle iOS?” I’d like to explain why I think this..

    First-of-its-kind Cyber Security Product Unifies Vulnerability Detection & Attack Protection

    Contrast Introduces Continuous Application Security Contrast Security, the next generation leader in finding..

    Contrast Security honored as Best of Breed winner in the 4th Annual 2016 Cyber Defense Magazine Infosec Awards in Application Security

    Contrast Security honored as Best of Breed winner in the 4th Annual 2016 Cyber Defense Magazine Infosec Awards in Application Security

    Recognizing Innovation During the RSA® Conference 2016 Palo Alto, Calif. – February 29, 2016 - Contrast Security, the..

    Serialization Must Die: Act 2: XStream (Jenkins CVE-2016-0792)

    Serialization Must Die: Act 2: XStream (Jenkins CVE-2016-0792)

    NOTE: Before you begin reading, you may want to visit the first article in this series: Serialization Must Die: Act 1:..

    Serialization Must Die: Act 1: Kryo

    Serialization Must Die: Act 1: Kryo

    When @frohoff, @gebl and @breenmachine all combined to melt Java security (in what I’m hereafter conflating under the..

    Third-Party Software Library and Airbag Grenades

    Third-Party Software Library and Airbag Grenades

    Recently Contrast Security ran some analysis of our customers’ 3rd party software usage, which is a huge security blind..

    A New, Open Source Tool Proves: Even After Patching, Deserializing Will Still Kill You

    A New, Open Source Tool Proves: Even After Patching, Deserializing Will Still Kill You

    With all the talk about Java serialization vulnerabilities, I thought I'd share a new, open source tool I built for you..