Skip to content

AppSec Observer

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Cybersecurity Awareness Month: How Contrast & the threat landscape have evolved

    Cybersecurity Awareness Month: How Contrast & the threat landscape have evolved

    This year marks the 20th year for Cybersecurity Awareness Month (CSAM), and the National Cybersecurity Alliance (NCA)..

    Cybersecurity Insights with Contrast CISO David Lindner | 10/27

    Cybersecurity Insights with Contrast CISO David Lindner | 10/27

    Insight #1 Virtual CISO (vCISO), CISO on Demand: These services are aka “Please help me short-term with security!” All..

    Cybersecurity Insights with Contrast CISO David Lindner | 10/20

    Cybersecurity Insights with Contrast CISO David Lindner | 10/20

    Insight #1 It’s time to stop measuring your security organization success by the number of vulnerabilities you find...

    The evolution of island hopping

    The evolution of island hopping

    Cyber Bank Heists report sheds light on the evolution of island-hopping cyber threats This year’sCyber Bank Heists..

    3 ways Contrast helps to build digital resilience

    3 ways Contrast helps to build digital resilience

    Cyberattacks, supply-chain issues, flooding, tsunamis, wildfires, equipment failures and even war: The financial sector..

    Cybersecurity Insights with Contrast CISO David Lindner | 10/13

    Cybersecurity Insights with Contrast CISO David Lindner | 10/13

    Insight #1 Google is now defaulting to the use of passkeys for authentication. This is a huge step in increasing the..

    6 of the biggest GitHub application security threats

    6 of the biggest GitHub application security threats

    GitHub is the Megladon of source code hosts, and as such, it sports a gargantuan bulls-eye that flashes neon to hackers..

    Cybersecurity Insights with Contrast CISO David Lindner | 10/6

    Cybersecurity Insights with Contrast CISO David Lindner | 10/6

    Insight #1 AI voice cloning is a problem: It’s reportedly taken the top spot in scam trends, particularly targeting..

    The top 8 AWS root user account best practices

    The top 8 AWS root user account best practices

    Amazon Web Services (AWS) has revolutionized the way organizations manage their IT infrastructure and applications...