Skip to content

Contrast Marketing

Subscribe Now
    Topics
    Contrast SECURITY VULNERABILITY DETECTION vs the Log4J2 CVE - A demonstration

    Contrast SECURITY VULNERABILITY DETECTION vs the Log4J2 CVE - A demonstration

    This week, Contrast Security proved that we could detect the Log4j2 vulnerability that caused CVE-2021-44228 and stop..

    Navigating (and Responding) to the Federal Binding Operational Directive 22-01

    Navigating (and Responding) to the Federal Binding Operational Directive 22-01

    The Directive Just over two weeks ago, on November 3rd, the Cybersecurity and Infrastructure Security Agency (CISA), a..

    The Trojan Source is Not Your Mane Problem

    The Trojan Source is Not Your Mane Problem

    A recently published paper provides a logo and slick polish for an old vulnerability about the ability of certain..

    Contrast Security named a 2021 Gartner Peer Insights Customers’ Choice for the 3rd year in a row for Application Security Testing

    Contrast Security named a 2021 Gartner Peer Insights Customers’ Choice for the 3rd year in a row for Application Security Testing

    Contrast Security receives 94% willingness to recommend based on 74 customer reviews As Contrast Security continues to..

    SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)

    SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)

    As readers of the AppSec Observer blog are aware, application attacks have continued unabated throughout the massive..

    Understanding Software Supply Chain Risks and How to Mitigate Them

    Understanding Software Supply Chain Risks and How to Mitigate Them

    As demand for new applications continues to rise, developers are adapting new tools and techniques to accelerate their..

    IAST Is the Only Way to Accurately Detect SSRF

    IAST Is the Only Way to Accurately Detect SSRF

    With server-side request forgery (SSRF) becoming a more important bug class in the era of microservices, I wanted to..

    Bounty Hunters Wanted: The Contrast Security Bug Bounty Program

    Bounty Hunters Wanted: The Contrast Security Bug Bounty Program

    A few years ago, Contrast Security launched a private, “invite-only” bug bounty program focused on Contrast Protect. We..

    Contrast Blocked Confluence CVE Attacks—Even Before the Patch

    Contrast Blocked Confluence CVE Attacks—Even Before the Patch

    On August 25, Atlassian released security updates to address a remote code execution vulnerability (CVE-2021-26084)..