Skip to content

AppSec Observer

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics

    Contrast Security Recognized as a Gartner Peer Insights Customers' Choice for Application Security Testing

    In the 2019 Gartner Peer Insights ‘Voice of the Customer’ Contrast Security received:

    July 2019 AppSec Intelligence Report: Attack Edition

    July 2019 AppSec Intelligence Report: Attack Edition

    July 2019 AppSec Intelligence Report: Attack Edition

    Coalfire PCI Compliance & Contrast Security

    Contrast Assess and Protect recently went through an independent evaluation by CoalFire, a respected Payment Card..

    June 2019 AppSec Intelligence Report: Attack Edition

    What is this report: This report summarizes Contrast Labs' analysis of real world application attack data from June..

    Stoked! The Creative Process of Street Skating and What Open Source Folks Can Learn From It

    “…all skateboarders speak a language of our own devising. We take simple movements and chunk them together in such a..

    Contrast Protect + WAF: A Day in the Life of a User

    A Web Application Firewall can watch network data, but the architecture does not enable them to see how that data is..

    Contrast Security Honored as a Silver Stevie® Award Winner in the 2019 American Business Awards® for Best Business Technology Software - DevOps Solution

    We are proud to announce that Contrast Security has been named a Silver Stevie Award winner for Best Business..

    How do teams stay afloat in an ocean of vulnerabilities? They remediate faster (3.0x FASTER!)

    As a developer, working through your team's bug backlog can sometimes feel like bailing out a rowboat with only a leaky..

    ProtectSettings

    Using Contrast to prevent the Weblogic Remote Code Execution (RCE) Deserialization Vulnerability - CVE-2019-2725

    On April 17, 2019, Oracle released a Critical Patch Advisory with 254 patches. One of the vulnerabilities addressed was..