2018 is "out of the gates" and off to a heck of a start. We hit the trifecta with the following three activities...starting with some new integrations!
Our development team has great things planned for both Contrast Asses and Protect with an..
2018 is "out of the gates" and off to a heck of a start. We hit the trifecta with the following three activities...starting with some new integrations!
Our development team has great things planned for both Contrast Asses and Protect with an..
BAY AREA OWASP MEETUP | Tuesday, Dec. 12th, 6:30-9:00 PM
More than ever before, the security of running enterprise applications is a shared responsibility between security, operations, development and engineering teams. However, all these groups are running blind when it comes to understanding the..
Ed Amoroso, former CISO of AT&T, and Founder and CEO of TAG Cyber, sat down for a conversation with Contrast Security CEO Alan Naumann, and CTO and Co-founder Jeff Williams. In these two, ten-minute interviews, Ed digs into the minds of these..
As we mentioned last week, Equifax continues to make headlines and ramifications of building sites with insecure code is taking a its toll. Below you'll read a series of startling comments that appeared this past week by Jeff Williams, Contrast..
Yes, we have all seen the headlines. But, don’t think that the issues that arose from the Equifax breach and the Struts 2 vulnerability will disappear any time soon. Last time I checked, there were 34 articles published that Contrast was either..
Contrast shortens feedback loops between teams by delivering results..
If you haven’t heard by now, Contrast has a brand spanking new report available… and lots of folks are talking about it. The report is entitled: State of Application Security: Libraries & Software Composition Analysis and highlights..
Application security gets harder every day. Every line of code written opens organizations to new vulnerabilities and breaches. Contrast is committed to supporting companies using Agile and DevOps by focusing product enhancements on..
We're looking forward to meeting you at the upcoming Velocity Conference in San Jose, June, 21 – 22. Please make time to meet us at our Booth or join us for Happy Hour on Wednesday, June 21st.
Join us for Happy Hour on June 21st at 6:30 PM..
"When we instrumented applications at the UK's largest Government Department with Contrast Assess, it was like handing our project teams an incredibly powerful debugging agent containing the sum total of application security knowledge.”
Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!
By subscribing to our blog you will stay on top of all the latest appsec news and devops best practices. You will also be informed of the latest Contrast product news and exciting application security events.
Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast's patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production.
Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software. Contrast’s patented deep security instrumentation completely disrupts traditional application security approaches with integrated, comprehensive security observability that delivers highly accurate assessment and continuous protection of an entire application portfolio. This eliminates the need for disruptive scanning, expensive infrastructure workloads, and specialized security experts. The Contrast Application Security Platform accelerates development cycles, improves efficiencies and cost, and enables rapid scale while protecting applications from known and unknown threats.