Skip to content

AppSec Observer

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    The Most Important Elements of Data & Application Security

    The Most Important Elements of Data & Application Security

    DZone recently interviewed 19 application and data security executives to gather insights and trends and business..

    How Secure Are Your Third-Party Libraries?

    Does your current AppSec tool provide you with the visibility and control you need? Unlike legacy solutions, Contrast..

    the-four-dimensions-of-application-security-coverage.jpg

    The 4 Dimensions of a sound Application Security Strategy

    For many application security vendors, "coverage" is the third rail — but it's a critical part of your application..

    Integrations Make Managing AppSec Even Easier!

    Integrations Make Managing AppSec Even Easier!

    At Contrast Security, we believe that application security should be pervasive and transparent. Application security..

    Why We Should Score Data Breaches

    Why We Should Score Data Breaches

    Contrast's CTO and Co-Founder, Jeff Williams, was interviewed by Forbes Magazine at Black Hat USA 2016 earlier this..

    Can Openness in the US Government Lead to Better Application Security?

    Can Openness in the US Government Lead to Better Application Security?

    On Tuesday morning, ZDNet reported that U.S. government has published a new federal policy that aims to encourage more..

    Peiter Zatko's (Mudge) Cyber Independent Testing Lab methods.... just another flash in the pan?

    Last week, The Intercept published an article (A Famed Hacker is Grading Thousands of Programs – and May Revolutionize..

    "The DCCC Hacked:  SQL Injection?  Come on."

    Jeff's comments here are a follow-up to his blog post "International hacks, politics and knee-jerk cybersecurity.....

    when-all-you-have-is-a-hammer-everything-looks-like-a-vulnerability.jpg

    With Only a Hammer, Everything Looks Like a Security Vulnerability!

    Did you know that most security vulnerabilities are simply the result of failing to use the right security control in..