Skip to content

AppSec Observer

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Cybersecurity Insights with Contrast CISO David Lindner | 8/4

    Cybersecurity Insights with Contrast CISO David Lindner | 8/4

    Insight #1 While it’s exciting to see the Securities and Exchange Commission (SEC) requiring ( PDF) incident..

    Cybersecurity Insights with Contrast CISO David Lindner | 7/28

    Cybersecurity Insights with Contrast CISO David Lindner | 7/28

    Insight #1 A recent report by Cohesity sees the top three things being required for cyber insurance coverage as being..

    The five dimensions of SBOM quality

    The five dimensions of SBOM quality

    In a memo issued on June 9, the Office of Management and Budget clarified details about how agencies will be required..

    Financial cybercrime trends: Reverse BEC & ‘shoxing’

    Financial cybercrime trends: Reverse BEC & ‘shoxing’

    Turla — a Russian advanced persistent threat (APT) group closely affiliated with the FSB Russian intelligence agency —..

    Cybersecurity Insights with Contrast CISO David Lindner | 7/21

    Cybersecurity Insights with Contrast CISO David Lindner | 7/21

    Insight #1 WormGPT is a thing. The tool — being sold on hacker forums and considered “ChatGPT’s evil cousin” — shows..

    Treat ALL data — not just PII — as if it’s regulated

    Treat ALL data — not just PII — as if it’s regulated

    Poor, poor Boston Globe.

    Why aren’t people patching the MOVEit bug?

    Why aren’t people patching the MOVEit bug?

    Know anything about CL0P, the ransomware gang connected to an attack on the popular MOVEit Transfer file-transfer..

    Contrast Assess rescues Snap Finance from drowning in vulnerability flood

    Contrast Assess rescues Snap Finance from drowning in vulnerability flood

    It’s enough to make your eyes cross: Floods of vulnerabilities pour in from disparate sources and tools.

    Considered harmful: Blindly shifting left

    Considered harmful: Blindly shifting left

    The motivation behind “shift left” security is sound.