Skip to content

AppSec Observer: Runtime Security

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Contrast's customer security advisors serve as strategic partners who guide and support your AppSec journey.

    We built it. Now we'll run it for you.

    As a Contrast Security customer you already have the best-in-class security platform for applications and application..

    Ensuring vigilant digital transformation in the financial sector

    Ensuring vigilant digital transformation in the financial sector

    Financial services are at the crossroads of innovation and threats from ever-more sophisticated cybercriminals. “In my..

    Contrast Security founder Jeff Williams explains how to fix AppSec in production

    Contrast Security founder Jeff Williams explains how to fix AppSec in production

    One of the most memorable parts of Black Hat was an interview with Alan Shimel of TechStrong TV and Katie Norton,..

    Contrast Application Detection and Response (ADR)

    Why Contrast Security is making the case for Application Detection and Response (ADR)

    On Aug. 6, Contrast Security introduced a new security technology we call Application Detection and Response (ADR). ADR..

    Contrast discovers CSRF vulnerability in NSA’s SkillTree training platform that allows attackers to modify content

    Contrast discovers CSRF vulnerability in NSA’s SkillTree training platform that allows attackers to modify content

    Contrast Security Assess — Contrast’s Interactive Application Security Testing (IAST) Application Security (AppSec)..

    Contrast wins 2024 PwC Luxembourg Award for Cybersecurity & Privacy Solution of the Year

    Contrast wins 2024 PwC Luxembourg Award for Cybersecurity & Privacy Solution of the Year

    Contrast Security just won the highly competitive 2024 PwC Luxembourg Award for Cybersecurity & Privacy Solution of the..

    How Contrast ‘secures from within:’ Code vulnerabilities set off smoke alarms; runtime incidents & cyberattacks trigger the sprinklers

    How Contrast ‘secures from within:’ Code vulnerabilities set off smoke alarms; runtime incidents & cyberattacks trigger the sprinklers

    What does Contrast Security mean when we say “secure from within?”

    Cybersecurity Insights with Contrast CISO David Lindner | 5/31/24

    Cybersecurity Insights with Contrast CISO David Lindner | 5/31/24

    Insight #1 Transparency isn't just about promising action, it's about proving it. It means sharing the data and results..

    Cybersecurity Insights with Contrast CISO David Lindner | 5/24/24

    Cybersecurity Insights with Contrast CISO David Lindner | 5/24/24

    Insight #1 Tool consolidation continues, with Palo Alto’s plans to absorb IBM's QRadar software. This movement will..