SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

Why Blue Teams Need RASP: Continuous Application Threat Monitoring with Runtime Exploit Prevention

Runtime Application Self-Protection (RASP) adds threat visibility and security control to application runtimes so you can continuously discover application threats and block attacks—as they are still happening. Enjoy visionary RASP..

Continue Reading >>

October 2019 AppSec Intelligence Report

This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from October 2019. It utilizes data from attacks that Contrast Security observed over the previous months and highlights the key trends found. 

Continue Reading >>

Let’s Talk About Sec — Making Impactful Security Updates to the Board of Directors

ByDena DeAngelo November 14, 2019

In 2019, for many businesses, experiencing a security breach is not a matter of if, but of when.

Continue Reading >>

3 Steps to Manage Vulnerabilities. Lessons from Surviving a Zombie Infestation.

ByDena DeAngelo October 30, 2019

Whether you’re scoping out your strategic survival plan in the event of a potential Zombie Apocalypse or drafting up your company’s security strategy, outlining some key rules of engagement will help increase your chances for a healthy outcome. In..

Continue Reading >>

Two Years After the Release of the 2017 OWASP Top Ten, Limited Improvements Shown

Contrast Labs finds that 71% of applications have at least one OWASP Top Ten vulnerability when onboarded to Contrast Assess.

Continue Reading >>

Elite Performers Choose Simpler Tools

I was fascinated to read this year’s   Accelerate State of DevOps Report 2019  which now represents six years of research and data from over 31,000 professionals in our industry. It delivers insight into the practices and capabilities that..
Continue Reading >>

September 2019 APPSEC INTELLIGENCE REPORT

This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from September 2019. It utilizes data from attacks that Contrast Security observed over the previous months and highlights the key trends..

Continue Reading >>

Pulling Back the Curtain On: Zip File Overwrites

Zip file overwrites are a cool but rare vulnerability that can occur on apps that work with user-supplied zip files. The folks at Snyk recently found a slew of libraries that do that, and there is a lot of history in this attack vector. In fact,..

Continue Reading >>

August 2019 AppSec Intelligence Report

This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from August 2019. It utilizes data from attacks that Contrast Security observed over the previous months and highlights the key trends found. 

Continue Reading >>

Pulling Back the Curtain on RASP

If you set out to build a new WAF today (which, believe it or not, people are still doing), everyone would have some idea of how it would work -- you'd setup a reverse proxy, and then use signatures of all kinds on the parameters, headers, body,..

Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook