<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=113894&amp;fmt=gif">

SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

Christine Carrig, Director of Marketing

Christine’s wide breadth of marketing experience has been focused on driving revenue, building brand recognition, and creating demand-generation programs in technology organizations. For the past 11 years, her deep understanding of marketing principles, coupled with forward thinking, has been instrumental in transforming application security start-ups into successful, profitable companies.

Connect With Us :  

New Cloud Security Integrations, Cool Data Analysis and an Article in Forbes

2018 is "out of the gates" and off to a heck of a start. We hit the trifecta with the following three activities...starting with some new integrations!

Our development team has great things planned for both Contrast Asses and Protect with an..

Continue Reading >>

Join Us On December 12th – OWASP Bay Area MeetUp

BAY AREA OWASP MEETUP | Tuesday, Dec. 12th, 6:30-9:00 PM

Application security professionals are invited to attend the upcoming OWASP Meetup, December 12th at the Contrast Headquarters in beautiful downtown Los Altos. Join in the merriment as you..

Continue Reading >>

Unify Security Across Teams – See How Contrast Does it in a 60-Minute Product Demonstration

More than ever before, the security of running enterprise applications is a shared responsibility between security, operations, development and engineering teams. However, all these groups are running blind when it comes to understanding the..

Continue Reading >>

Interview with Software Security Experts

Ed Amoroso, former CISO of AT&T, and Founder and CEO of TAG Cyber, sat down for a conversation with Contrast Security CEO Alan Naumann, and CTO and Co-founder Jeff Williams. In these two, ten-minute interviews, Ed digs into the minds of these..

Continue Reading >>

Redirects from Third-party JavaScript on Equifax Lead to More Hacks

As we mentioned last week, Equifax continues to make headlines and ramifications of building sites with insecure code is taking a its toll. Below you'll read a series of startling comments that appeared this past week by Jeff Williams, Contrast..

Continue Reading >>

Still Making Headlines – Struts 2 and the Equifax Breach

Yes, we have all seen the headlines.  But, don’t think that the issues that arose from the Equifax breach and the Struts 2 vulnerability will disappear any time soon. Last time I checked, there were 34 articles published that Contrast was either..

Continue Reading >>

SHARING IS CARING. Share Software Security Data with Development Teams, SIEMs and much more.

Contrast integrates into your SDLC, and scales to your entire application portfolio and all your stakeholders.
Deliver Security Results into Tools Your Team Already Loves

Contrast shortens feedback loops between teams by delivering results..

Continue Reading >>

NEW REPORT: Just 7% of Application Vulnerabilities are Sourced from 3rd-Party Code Libraries

If you haven’t heard by now, Contrast has a brand spanking new report available… and lots of folks are talking about it. The report is entitled: State of Application Security: Libraries & Software Composition Analysis and highlights..

Continue Reading >>

With DevOps Security Must Work Differently

Application security gets harder every day. Every line of code written opens organizations to new vulnerabilities and breaches. Contrast is committed to supporting companies using Agile and DevOps by focusing product enhancements on..

Continue Reading >>

PRESS RELEASE: New Executives Strengthen Contrast Security’s Leadership in Self-Protecting Software

Senior leaders will bolster software security’s crucial role in digital transformation for enterprises

Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook