Skip to content

Contrast Marketing

Subscribe Now
    Topics
    Extending Protection With Azure Sentinel

    Extending Protection With Azure Sentinel

    Applications are perpetually accosted by hackers intent on doing harm to your business. They'll dig and look under the..

    What Security Lessons Can Come From the Kaseya Ransomware Attack?

    What Security Lessons Can Come From the Kaseya Ransomware Attack?

    This year will be remembered as annus horribilis for attacks against the software supply chain. In the first half of..

    How To Secure Your Application Inside Azure Kubernetes Service in 10 Minutes

    How To Secure Your Application Inside Azure Kubernetes Service in 10 Minutes

    The Cloud Impacts Application Security Organizations everywhere are making their way into the cloud with some form of..

    Real-time Remediation Support Helps Developers Write Better Code

    Real-time Remediation Support Helps Developers Write Better Code

    Learning From Our Software Development Mistakes Like anyone else, I hate making mistakes. When I do, I usually feel..

    MORE JAVA ATTACKS HIT EXISTING VULNERABILITIES IN MARCH–APRIL

    MORE JAVA ATTACKS HIT EXISTING VULNERABILITIES IN MARCH–APRIL

    The massive application attacks on SolarWinds and Microsoft Exchange Server in recent months did not slow the activity..

    How It Took Two Years to Resolve Remote Code Execution Vulnerability CVE-2020-17091

    How It Took Two Years to Resolve Remote Code Execution Vulnerability CVE-2020-17091

    Microsoft Teams vulnerability exposed serious risk to the software supply chain

    Contrast Announces the First Breakthrough in SAST in 15 Years

    Contrast Announces the First Breakthrough in SAST in 15 Years

    Traditional Scanning Tools Can’t Keep Up

    How to Secure Jenkins Pipelines without the hassle

    How to Secure Jenkins Pipelines without the hassle

    Organizations spend countless hours and resources trying to effectively incorporate application security into their..

    President Biden’s Executive Cybersecurity Order: Secure the Software Supply Chain

    President Biden’s Executive Cybersecurity Order: Secure the Software Supply Chain

    In the fallout of a successful ransomware attack on a pipeline that supplies nearly half the East Coast’s gasoline,..