Skip to content

AppSec Observer: Application Security (11)

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    handbook-cover0616.png

    Surprised Contrast is a Magic Quadrant Visionary? Good!

    Contrast Security recently achieved “Visionary” placement on the 2014 Gartner Magic Quadrant for Application Security..

    Java Agents, Memory, and the Importance of Measuring

    Java Agents, Memory, and the Importance of Measuring

    "How much memory do I need to add to my JVM to account for Contrast?" Man, these questions sound really simple, don't..

    ColdFusion Vulnerabilities and High-Profile Hacks

    ColdFusion Vulnerabilities and High-Profile Hacks

    ColdFusion was hugely popular when it arrived: it had commercial support, an easy syntax for web developers, and..

    The Ankle Biters of the Application Security World

    The Ankle Biters of the Application Security World

    The playing field isn't exactly level, and ankle biters (aka script kiddies and hackers) know it. While businesses and..

    Why Static Application Security Scanners Just Can't Cut It Anymore

    Why Static Application Security Scanners Just Can't Cut It Anymore

    Static Analysis and Dynamic Analysis Tools Have Their Place To be clear: I’ve been an advocate of both dynamic..

    Which Application Security Vulnerabilities Do I Fix First?

    Which Application Security Vulnerabilities Do I Fix First?

    Not every vulnerability is a critical one. Let's face it: Not all vulnerabilities are created equal. Not every..

    The 6 Pillars of Application Security

    The 6 Pillars of Application Security

    Once you discover a vulnerability, it instantly is super-critical information. How do you protect security..

    Is Your AppSec Tool Truly Scalable?

    Is Your AppSec Tool Truly Scalable?

    Many businesses are trapped in a dilemma, a Morten's Fork – should we rely on automated tools to assure the application..

    The OWASP Top Ten and Beyond

    The OWASP Top Ten and Beyond

    The past decade shows only trivial progress in improving web app security, according to new vulnerability guidelines in..