<iframe src="//www.googletagmanager.com/ns.html?id=GTM-WQV6DT" height="0" width="0" style="display:none;visibility:hidden">

SECURITY INFLUENCERS BLOG

Security influencers provide real-world insight and “in-the-trenches” experiences on topics ranging from application security to DevOps and risk management

Contrast Security awarded a 2017 Red Herring Top 100 North America Winner

Last week, Red Herring announced the winners of its Top 100 North America 2017 event, recognizing the continent’s most exciting and innovative private technology companies.  We’re delighted to announce that Contrast Security made the Top 100! 

Continue Reading

Contrast Brings Security into the DevOps Era

Latest Product Enhancements and Integrations Support Companies using Agile and DevOps to Deliver on Digital Transformation Initiatives

Los Altos, Calif. – June 20, 2017Contrast Security, the first company to enable self-protecting software,..

Continue Reading

Are You Ready to Automate Security Testing? Meet DevSecOps.

It is no secret that software applications today are complex and can potentially be riddled with many different security issues. From bad code to misconfigured servers and everything in between, solving this problem requires security implications to

Continue Reading

Supercharged Application Resilience: Improve Performance with Application Security Monitoring

More and more companies interact with customers via digital channels, making the digital customer experience they provide a critical component of business success1. A crashed or poorly performing application will negatively impact customer..

Continue Reading

Join Us for Cocktails During the Velocity Conference on June 21st

Continue Reading

How Contrast Protect Out-Firewalls Web Application Firewalls (WAFs)

Contrast Protect helps to secure software applications in a radically better way than legacy tools like web application firewalls (WAFs). Contrast operates from within your application, moving and scaling with the app, providing accurate attack..

Continue Reading

Insights from Microsoft Build Conference 2017

At Microsoft Build in Seattle earlier this month, Microsoft presented its strategy and demonstrated its commitment to help move enterprises into the digital era. This transformation will require businesses to embrace technologies like cloud,..

Continue Reading

CAS: The Best Way to Modernize Application Security

In case you don't recognize the acronym, "CAS" stands for Continuous Application Security. It may not become a household name, but here at Contrast we believe it will be as common as "WAFs" within our industry.  CAS will help lead the way to..

Continue Reading

A CTO's Response to Trump's Cybersecurity Executive Order

In principle, holding each agency head accountable for his or her agency’s cybersecurity is logical. The problem with that is they were already accountable. When the OPM was breached, director Katherine Archuleta stepped down. And there were calls..

Continue Reading

Improve Application Security by Turning it into Code

Why is application security such a pain? One of the hard problems with application security is that there are a zillion different ways that things can go wrong.

Continue Reading

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook