Skip to content

AppSec Observer

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Real-time Remediation Support Helps Developers Write Better Code

    Real-time Remediation Support Helps Developers Write Better Code

    Learning From Our Software Development Mistakes Like anyone else, I hate making mistakes. When I do, I usually feel..

    MORE JAVA ATTACKS HIT EXISTING VULNERABILITIES IN MARCH–APRIL

    MORE JAVA ATTACKS HIT EXISTING VULNERABILITIES IN MARCH–APRIL

    The massive application attacks on SolarWinds and Microsoft Exchange Server in recent months did not slow the activity..

    Why Developers Should Care About Our New Go Agent: A Look Under the Hood

    Why Developers Should Care About Our New Go Agent: A Look Under the Hood

    Last month, we released the industry’s first integrated security analyzer for Go. Now that it has been available for a..

    How It Took Two Years to Resolve Remote Code Execution Vulnerability CVE-2020-17091

    How It Took Two Years to Resolve Remote Code Execution Vulnerability CVE-2020-17091

    Microsoft Teams vulnerability exposed serious risk to the software supply chain

    Contrast Announces the First Breakthrough in SAST in 15 Years

    Contrast Announces the First Breakthrough in SAST in 15 Years

    Traditional Scanning Tools Can’t Keep Up

    Contrast Challenges the AST Status Quo in the Gartner 2021 AST Magic Quadrant

    Contrast Challenges the AST Status Quo in the Gartner 2021 AST Magic Quadrant

    Gartner released its latest Magic Quadrant for application security testing (AST)—naming Contrast Security as a..

    CONTRAST STUDY FINDS SIGNIFICANT APPLICATION SECURITY RISK AT FINANCIAL SERVICES ENTERPRISES

    CONTRAST STUDY FINDS SIGNIFICANT APPLICATION SECURITY RISK AT FINANCIAL SERVICES ENTERPRISES

    Only 25% Can Successfully Triage All Security Alerts, and 98% Have Had 3+ Successful Attacks

    How to Secure Jenkins Pipelines without the hassle

    How to Secure Jenkins Pipelines without the hassle

    Organizations spend countless hours and resources trying to effectively incorporate application security into their..

    President Biden’s Executive Cybersecurity Order: Secure the Software Supply Chain

    President Biden’s Executive Cybersecurity Order: Secure the Software Supply Chain

    In the fallout of a successful ransomware attack on a pipeline that supplies nearly half the East Coast’s gasoline,..