<iframe src="//www.googletagmanager.com/ns.html?id=GTM-WQV6DT" height="0" width="0" style="display:none;visibility:hidden">
"Recognized as a 2016 Emerging Vendor"
CRN® named Contrast Security to its 2016 list of Emerging Vendors. This annual list recognizes recently founded, up-and-coming technology suppliers who are shaping the future of the IT channel through unique technological innovations. 
Read the Press Release

Dark Reading Launches Best Of Black Hat Awards Program: Jeff Williams a Finalist

Dark Reading announced the launch of a new annual awards program, the Best of Black Hat Awards, which recognizes innovative companies and business leaders on the conference’s exhibit floor.

Jeff Williams from Contrast Security has been selected as one of three finalists in the Most Innovative Thought Leader category for his work as a cyber security innovator.

Read the full article from Dark Reading >>
Download the Application Security Handbook >> 

DR_Best-of-BH_Awards-Logo_FINALIST.png

Application Security that's Pinpoint Accurate,
Breathtakingly Easy, and Lightning Fast.

Contrast Enterprise knows where apps are weak and can instantly deploy adaptive defenses to protect an organization's entire application portfolio.

Contrast is the first application security product to integrate defenses across development and operations, unifying vulnerability assessment, security visibility and attack protection throughout the application lifecycle.

Get the Data Sheet >>
Read the Press Release >>
Download the Whitepaper >> 

accurate-icon.png

On Demand Recording
IAST: Application Security At Agile Speed & Portfolio Scale

Time to learn about interactive application security testing (IAST), a technology that is transforming the way businesses approach finding and remediating vulnerabilities. Watch this recording to learn: 

  • Strengths and limitations of SAST and DAST
  • What IAST is and how it differs from existing approaches
  • How software instrumentation – used extensively in the application performance management market – can be used for application security

REGISTER NOW

gartner.jpg
Named a Visionary" 
Application Security Testing Magic Quadrant
READ THE REPORT >> 

emerging_vendors_award.jpg
"Recognized as a 2016 Emerging Vendor"
The Channel Co.


CYBERdefenseWinner0216.jpgBest of Breed in Application
Security Solution of 2016
"
 
Cyber Defense Magazine Infosec Awards

The True Cost of "False Positives" in Application Security 

July 19 – Remember the story of the boy who cried wolf? His pranks were "false alarms" - defined as "a mistaken or intentionally misleading alert that something is wrong and needs attention." False alarms from application security tools are certainly annoying, but how do they affect the overall economics of an application security program? As it turns out, they make all the difference.

Read More

International hacks, politics and knee-jerk cybersecurity... 
never a good mix. 
Russia & the DNC Hack
 

July 26  – The FBI is now leading an investigation into a hack into the Democratic National Committee. This is the first acknowledgment from the agency that they are probing the incident, which US officials suspect came from a Russian cyberattack. 

READ MORE