Skip to content

Contrast Marketing

Subscribe Now
    Topics
    SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)

    SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)

    As readers of the AppSec Observer blog are aware, application attacks have continued unabated throughout the massive..

    Understanding Software Supply Chain Risks and How to Mitigate Them

    Understanding Software Supply Chain Risks and How to Mitigate Them

    As demand for new applications continues to rise, developers are adapting new tools and techniques to accelerate their..

    IAST Is the Only Way to Accurately Detect SSRF

    IAST Is the Only Way to Accurately Detect SSRF

    With server-side request forgery (SSRF) becoming a more important bug class in the era of microservices, I wanted to..

    Bounty Hunters Wanted: The Contrast Security Bug Bounty Program

    Bounty Hunters Wanted: The Contrast Security Bug Bounty Program

    A few years ago, Contrast Security launched a private, “invite-only” bug bounty program focused on Contrast Protect. We..

    Contrast Blocked Confluence CVE Attacks—Even Before the Patch

    Contrast Blocked Confluence CVE Attacks—Even Before the Patch

    On August 25, Atlassian released security updates to address a remote code execution vulnerability (CVE-2021-26084)..

    Modern Problems: Traditional Security Scanning Wasn’t Built for Today’s Pipelines

    Modern Problems: Traditional Security Scanning Wasn’t Built for Today’s Pipelines

    Over the past 20 years, source-code scanning using static analysis has been a principal method for testing the security..

    Contrast Meets Kenna: Teaming Up To Manage Vulnerabilities

    Contrast Meets Kenna: Teaming Up To Manage Vulnerabilities

    A new joint solution from Contrast Security and Kenna Security enables organizations to manage vulnerabilities in one..

    How To Start DevSecOps Within the Public Cloud—a Technical Guide

    How To Start DevSecOps Within the Public Cloud—a Technical Guide

    Setting the Stage: Application Security for Containerized Applications in AWS Organizations everywhere are either..

    TELEMETRY SHOWS THAT CUSTOM CODE MAKES UP 78% OF ACTIVE CODE

    TELEMETRY SHOWS THAT CUSTOM CODE MAKES UP 78% OF ACTIVE CODE

    Application Security Observability Report Finds that 74% of Code In An Application Is Never Invoked Digital..