Skip to content

Contrast Marketing

Subscribe Now
    Topics

    How Secure Are Your Third-Party Libraries?

    Does your current AppSec tool provide you with the visibility and control you need? Unlike legacy solutions, Contrast..

    Integrations Make Managing AppSec Even Easier!

    Integrations Make Managing AppSec Even Easier!

    At Contrast Security, we believe that application security should be pervasive and transparent. Application security..

    Why We Should Score Data Breaches

    Why We Should Score Data Breaches

    Contrast's CTO and Co-Founder, Jeff Williams, was interviewed by Forbes Magazine at Black Hat USA 2016 earlier this..

    LOGOdarkreading0716.png

    Jeff Williams Selected as Finalist for the Dark Reading’s Best of Black Hat Innovator Awards

    Our CTO and cofounder Jeff Williams has been selected as one of three finalists for Dark Reading’s Best of Black Hat..

    The Client Is Not Always Right!

    The Client Is Not Always Right!

    J’accuse! I often get the question, “How well does your product handle iOS?” I’d like to explain why I think this..

    First-of-its-kind Cyber Security Product Unifies Vulnerability Detection & Attack Protection

    Contrast Introduces Continuous Application Security Contrast Security, the next generation leader in finding..

    Contrast Security honored as Best of Breed winner in the 4th Annual 2016 Cyber Defense Magazine Infosec Awards in Application Security

    Contrast Security honored as Best of Breed winner in the 4th Annual 2016 Cyber Defense Magazine Infosec Awards in Application Security

    Recognizing Innovation During the RSA® Conference 2016 Palo Alto, Calif. – February 29, 2016 - Contrast Security, the..

    Serialization Must Die: Act 2: XStream (Jenkins CVE-2016-0792)

    Serialization Must Die: Act 2: XStream (Jenkins CVE-2016-0792)

    NOTE: Before you begin reading, you may want to visit the first article in this series: Serialization Must Die: Act 1:..

    Serialization Must Die: Act 1: Kryo

    Serialization Must Die: Act 1: Kryo

    When @frohoff, @gebl and @breenmachine all combined to melt Java security (in what I’m hereafter conflating under the..