Skip to content

Contrast Marketing

Subscribe Now
    Topics
    TechTarget:

    TechTarget: "Getting runtime application self-protection launched"

    In this piece, Ed Tittle of TechTarget, dives into how, while runtime application self-protection is a mouthful, it’s..

    application-security-contrast.jpg

    Application Security: How Microsoft’s Chairman is Fighting Hackers

    "We've got to start to rethink the application security paradigm, not just the information security paradigm," Thompson..

    The VAR Guy: When It Comes to Cybersecurity, Both Candidates Disappoint

    The VAR Guy: When It Comes to Cybersecurity, Both Candidates Disappoint

    Last night’s presidential debate raised a lot of eyebrows on a multitude of subjects. This morning, everyone has an..

    Application Security Integrations: Start Slacking!

    Application Security Integrations: Start Slacking!

    If you’re one of the three million daily active users of Slack, then chat based-collaboration is something that is very..

    Library-Security-1.jpg

    How Can Devs Keep Up with the Library Security Devil?

    So, you don’t have the budget to buy Contrast, but you want your developers to be on top of the security of your open..

    Arc-blue_logo.jpg

    Insights from a CISO: Compliance & Application Security

    Contrast interviews folks who are "Security Influencer's" and then shares their knowledge via online media. We see..

    IAST & the Villainous Library Named

    IAST & the Villainous Library Named "commons-httpclient-3.1.jar"

    Let’s talk about commons-httpclient-3.1.jar. I get asked about this library all the time. It’s an HTTP communication..

    Insecure Code: TechBeacon Talks Dangerous Code & Programming Missteps

    Insecure Code: TechBeacon Talks Dangerous Code & Programming Missteps

    This week, Erik Sherman of TechBeacon mentioned Jeff Williams, Contrast Security CTO and Co-Founder, in an article on..

    The Most Important Elements of Data & Application Security

    The Most Important Elements of Data & Application Security

    DZone recently interviewed 19 application and data security executives to gather insights and trends and business..