SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

DECEMBER 2019 AppSec Intelligence Report

This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from December 2019. By providing continuous insight and detection from inside applications, Contrast can identify and trend the way that..

Continue Reading >>

Why You Need Both a WAF and RASP to Protect Your Web Applications

One thing that you learn in the technology space is that change is constant. Companies, solutions, and people who sit on their laurels can find themselves in a position of never-ending catch up. For security operations and application security..

Continue Reading >>

Why Application Flow Maps Are the Coolest Feature in Application Security

Application flow maps are the cool feature you can use to discover that needle in a haystackhow does my running app work and what does my app connect to?

Continue Reading >>

November 2019 AppSec Intelligence Report

This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from November 2019. It builds on data that Contrast Security observed over the previous months and highlights to highlight key trends and useful..

Continue Reading >>

Why Blue Teams Need RASP: Continuous Application Threat Monitoring with Runtime Exploit Prevention

Runtime Application Self-Protection (RASP) adds threat visibility and security control to application runtimes so you can continuously discover application threats and block attacks—as they are still happening. Enjoy visionary RASP breach..

Continue Reading >>

October 2019 AppSec Intelligence Report

This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from October 2019. It utilizes data from attacks that Contrast Security observed over the previous months and highlights the key trends found. 

Continue Reading >>

Let’s Talk About Sec — Making Impactful Security Updates to the Board of Directors

ByDena DeAngelo November 14, 2019

In 2019, for many businesses, experiencing a security breach is not a matter of if, but of when.

Continue Reading >>

3 Steps to Manage Vulnerabilities. Lessons from Surviving a Zombie Infestation.

ByDena DeAngelo October 30, 2019

Whether you’re scoping out your strategic survival plan in the event of a potential Zombie Apocalypse or drafting up your company’s security strategy, outlining some key rules of engagement will help increase your chances for a healthy outcome. In..

Continue Reading >>

Two Years After the Release of the 2017 OWASP Top Ten, Limited Improvements Shown

Contrast Labs finds that 71% of applications have at least one OWASP Top Ten vulnerability when onboarded to Contrast Assess.

Continue Reading >>

Elite Performers Choose Simpler Tools

I was fascinated to read this year’s   Accelerate State of DevOps Report 2019  which now represents six years of research and data from over 31,000 professionals in our industry. It delivers insight into the practices and capabilities that..
Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook