Skip to content

AppSec Observer

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics

    The DevOpsification of Security

    In an article "The DevOpsification of Security," written by Redpoint Ventures principal Lenny Pruss, Contrast Security..

    sc_logo_21413_345884.png

    Poor Election Cybersecurity Abounds

    In an SC Magazine article published earlier this week, Larry Jaffee discusses the potential cybersecurity concerns of..

    DOM XSS in wix.com

    DOM XSS in wix.com

    Wix.com, a hosting provider which claims to host millions of websites, contains an XSS that leads to administrator..

    man computer

    Chat all you want… but will that data in your message be secure?

    Businesses are looking to tools to improve productivity — no surprise right. Business apps are not just “stand-alone”..

    application-security-tools-third-category-1.jpg

    Is There a 3rd Category of Application Security Tools Beyond Static & Dynamic?

    Recently, Clark Coleman asked a very logical question about application security tools: Can you explain the difference..

    Application Security: Changes to Microsoft Patch Tuesday

    Application Security: Changes to Microsoft Patch Tuesday

    Everyone should be patching like Microsoft. You can argue with some of the tiny details about how Microsoft schedules..

    TechTarget:

    TechTarget: "Getting runtime application self-protection launched"

    In this piece, Ed Tittle of TechTarget, dives into how, while runtime application self-protection is a mouthful, it’s..

    application_security_federal_ciso.png

    So, Now We Have a Federal CISO...

    So, now we have a federal CISO, Brigadier General [Retired] Gregory J. Touhill, as part of the Office of Management and..

    application-security-contrast.jpg

    Application Security: How Microsoft’s Chairman is Fighting Hackers

    "We've got to start to rethink the application security paradigm, not just the information security paradigm," Thompson..