Skip to content

AppSec Observer: Application Security (9)

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Crash Testing your Connected Stuff — Before you Get Hacked!

    Crash Testing your Connected Stuff — Before you Get Hacked!

    People have to pay to subscribe to Consumer Reports. But you may benefit from a new wave of security testing — for..

    It’s Still Flu Season: Get a Flu Shot! Masks Won’t Help — Same Goes for AppSec — Read a WAF Comparison

    It’s Still Flu Season: Get a Flu Shot! Masks Won’t Help — Same Goes for AppSec — Read a WAF Comparison

    Come flu season, you have two options – cover your face with a mask and hope you don’t catch anything. Or, do the..

    owasp-logo-vert.png

    What is OWASP, and Why it Matters for AppSec

    Vulnerability research conducted by Contrast Labs was referenced in an article "What is OWASP and Why it Matters for..

    Dashboard0127.png

    The 3 disadvantages of using WAF Network Security

    It is time… time to ditch traditional approaches to the way we have managed application security. Specifically, it’s..

    continuous-application-security.jpeg

    Automating Application Security in Modern Software Projects

    Today, it seems like every organization has become a software company. The increasing dependence on automation demands..

    the-four-dimensions-of-application-security-coverage.jpg

    The 4 Dimensions of a sound Application Security Strategy

    For many application security vendors, "coverage" is the third rail — but it's a critical part of your application..

    Integrations Make Managing AppSec Even Easier!

    Integrations Make Managing AppSec Even Easier!

    At Contrast Security, we believe that application security should be pervasive and transparent. Application security..

    Can Openness in the US Government Lead to Better Application Security?

    Can Openness in the US Government Lead to Better Application Security?

    On Tuesday morning, ZDNet reported that U.S. government has published a new federal policy that aims to encourage more..

    when-all-you-have-is-a-hammer-everything-looks-like-a-vulnerability.jpg

    With Only a Hammer, Everything Looks Like a Security Vulnerability!

    Did you know that most security vulnerabilities are simply the result of failing to use the right security control in..