Skip to content

AppSec Observer: Thought Leaders (14)

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics

    Two New Vulnerabilities added to the OWASP Top 10

    The Open Web Application Security Project (OWASP) just released an update to the ten most critical web application..

    How Can CISOs Create A Balanced Portfolio Of Cybersecurity Products?

    We’re entering a world of deepening complexity when it comes to security for the modern enterprise. With companies..

    US Needs a Federal CISO — A Response to the Appointment of a US Cybersecurity Coordinator

    In response to the Trump administration announcement of the appointment of a White House cybersecurity coordinator...

    owasp-logo-vert.png

    What is OWASP, and Why it Matters for AppSec

    Vulnerability research conducted by Contrast Labs was referenced in an article "What is OWASP and Why it Matters for..

    Cybersecurity Execs Voice Concern over Trump Travel Ban

    Cybersecurity Execs Voice Concern over Trump Travel Ban

    Last Friday President Trump signed executive orders that banned nationals of seven countries that included all people..

    DevOps Security: Turn Security into Code [RSA Preview]

    DevOps Security: Turn Security into Code [RSA Preview]

    The San Francisco edition of the annual RSA security conference is just around the corner. DevOps security is a hot..

    Dashboard0127.png

    The 3 disadvantages of using WAF Network Security

    It is time… time to ditch traditional approaches to the way we have managed application security. Specifically, it’s..

    an-executive-viewpoint-in-2017-fighting-an-uphill-battle-for-cybersecurity.jpg

    An Executive Viewpoint in 2017: Fighting an Uphill Battle for Cybersecurity

    This week, Virtual Strategy Magazine posted Jeff Williams' 2017 cybersecurity predictions as part of its executive..

    Where the Industrial IoT Vulnerabilities Lurk in Your Plant

    When you connect manufacturing machinery to the internet, you've created a potential gateway for hackers to exploit...