SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

Misconfigurations and Alert Fatigue Require a Modern AppSec Approach

Businesses are adopting development and operations (DevOps) to tap into new business opportunities. These DevOps initiatives are the engine driving digital transformation. But as DevOps takes hold and organizations focus more and more of their time..

Continue Reading >>

AppSec-related Must-do Activities and Sessions at RSA 2020

This year’s theme at RSA Conference 2020 is the Human Element. Fundamentally, what those of us do in the realm of cybersecurity goes beyond protecting our networks, applications, and systems; it’s about people protecting people.

Continue Reading >>

4 Reasons to Automate Security Testing with AppSec Instrumentation

While the idea of “automation” may seem like a modern concept, it dates back to around 762 B.C. when the concept was first introduced in Homer’s epic battle poem The Iliad.

Continue Reading >>

How I Made $600 in Bug Bounty in 15 Minutes with Contrast CE – CVE- 2019-8442

We live in a dynamic economy that is constantly developing new ways to generate revenue. An area that fascinates me are the bug bounty programs such as Atlassian on BugCrowd. Generating tangible rewards from these programs is not an easy..

Continue Reading >>

Public WiFi is actually still pretty dangerous

I wanted to write a short response to an article EFF posted, Why Public Wi-Fi is a Lot Safer Than You Think. It's no secret transport layer security has vastly improved over the years -- so I generally agree with a lot of the points made here. For..

Continue Reading >>

DECEMBER 2019 AppSec Intelligence Report

This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from December 2019. By providing continuous insight and detection from inside applications, Contrast can identify and trend the way that..

Continue Reading >>

Why You Need Both a WAF and RASP to Protect Your Web Applications

One thing that you learn in the technology space is that change is constant. Companies, solutions, and people who sit on their laurels can find themselves in a position of never-ending catch up. For security operations and application security..

Continue Reading >>

Why Application Flow Maps Are the Coolest Feature in Application Security

Application flow maps are the cool feature you can use to discover that needle in a haystackhow does my running app work and what does my app connect to?

Continue Reading >>

November 2019 AppSec Intelligence Report

This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from November 2019. It builds on data that Contrast Security observed over the previous months and highlights to highlight key trends and useful..

Continue Reading >>

Why Blue Teams Need RASP: Continuous Application Threat Monitoring with Runtime Exploit Prevention

Runtime Application Self-Protection (RASP) adds threat visibility and security control to application runtimes so you can continuously discover application threats and block attacks—as they are still happening. Enjoy visionary RASP breach..

Continue Reading >>

SUBSCRIBE TO THE BLOG