Skip to content

AppSec Observer

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Contrast Meets Kenna: Teaming Up To Manage Vulnerabilities

    Contrast Meets Kenna: Teaming Up To Manage Vulnerabilities

    A new joint solution from Contrast Security and Kenna Security enables organizations to manage vulnerabilities in one..

    MUST-FIX VULNERABILITIES PER APPLICATION JUMP IN MAY–JUNE

    MUST-FIX VULNERABILITIES PER APPLICATION JUMP IN MAY–JUNE

    High-profile, damaging cyberattacks continued unabated in May and June of this year. Many American consumers felt the..

    How To Start DevSecOps Within the Public Cloud—a Technical Guide

    How To Start DevSecOps Within the Public Cloud—a Technical Guide

    Setting the Stage: Application Security for Containerized Applications in AWS Organizations everywhere are either..

    CONTRAST APPLICATION SECURITY PLATFORM CUTS VULNERABILITY ESCAPE RATE (VER) FROM 12 TO 1 IN A YEAR

    CONTRAST APPLICATION SECURITY PLATFORM CUTS VULNERABILITY ESCAPE RATE (VER) FROM 12 TO 1 IN A YEAR

    Application Security Observability Report Shows Developers Write More Secure Code the More They Use the Contrast..

    CONTRAST CUSTOMERS HIT REMEDIATION MILESTONE NEARLY 29X FASTER THAN TRADITIONAL APPROACHES

    CONTRAST CUSTOMERS HIT REMEDIATION MILESTONE NEARLY 29X FASTER THAN TRADITIONAL APPROACHES

    Application Security Observability Report Finds Median Time To Remediate Is 3 Days Versus 86 Days Security debt—the..

    TELEMETRY SHOWS THAT CUSTOM CODE MAKES UP 78% OF ACTIVE CODE

    TELEMETRY SHOWS THAT CUSTOM CODE MAKES UP 78% OF ACTIVE CODE

    Application Security Observability Report Finds that 74% of Code In An Application Is Never Invoked Digital..

    Extending Protection With Azure Sentinel

    Extending Protection With Azure Sentinel

    Applications are perpetually accosted by hackers intent on doing harm to your business. They'll dig and look under the..

    What Security Lessons Can Come From the Kaseya Ransomware Attack?

    What Security Lessons Can Come From the Kaseya Ransomware Attack?

    This year will be remembered as annus horribilis for attacks against the software supply chain. In the first half of..

    How To Secure Your Application Inside Azure Kubernetes Service in 10 Minutes

    How To Secure Your Application Inside Azure Kubernetes Service in 10 Minutes

    The Cloud Impacts Application Security Organizations everywhere are making their way into the cloud with some form of..