<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=113894&amp;fmt=gif">

SECURITY INFLUENCERS BLOG

Security influencers provide real-world insight and “in-the-trenches” experiences on topics ranging from application security to DevOps and risk management

Christine Carrig, Director of Marketing

Christine’s wide breadth of marketing experience has been focused on driving revenue, building brand recognition, and creating demand-generation programs in technology organizations. For the past 11 years, her deep understanding of marketing principles, coupled with forward thinking, has been instrumental in transforming application security start-ups into successful, profitable companies.

Connect With Us :  

Interview with Software Security Experts

Ed Amoroso, former CISO of AT&T, and Founder and CEO of TAG Cyber, sat down for a conversation with Contrast Security CEO Alan Naumann, and CTO and Co-founder Jeff Williams. In these two, ten-minute interviews, Ed digs into the minds of these..

Continue Reading >>

Redirects from Third-party JavaScript on Equifax Lead to More Hacks

As we mentioned last week, Equifax continues to make headlines and ramifications of building sites with insecure code is taking a its toll. Below you'll read a series of startling comments that appeared this past week by Jeff Williams, Contrast..

Continue Reading >>

Still Making Headlines – Struts 2 and the Equifax Breach

Yes, we have all seen the headlines.  But, don’t think that the issues that arose from the Equifax breach and the Struts 2 vulnerability will disappear any time soon. Last time I checked, there were 34 articles published that Contrast was either..

Continue Reading >>

SHARING IS CARING. Share Software Security Data with Development Teams, SIEMs and much more.

Contrast integrates into your SDLC, and scales to your entire application portfolio and all your stakeholders.
Deliver Security Results into Tools Your Team Already Loves

Contrast shortens feedback loops between teams by delivering results..

Continue Reading >>

NEW REPORT: Just 7% of Application Vulnerabilities are Sourced from 3rd-Party Code Libraries

If you haven’t heard by now, Contrast has a brand spanking new report available… and lots of folks are talking about it. The report is entitled: State of Application Security: Libraries & Software Composition Analysis and highlights..

Continue Reading >>

With DevOps Security Must Work Differently

Application security gets harder every day. Every line of code written opens organizations to new vulnerabilities and breaches. Contrast is committed to supporting companies using Agile and DevOps by focusing product enhancements on..

Continue Reading >>

PRESS RELEASE: New Executives Strengthen Contrast Security’s Leadership in Self-Protecting Software

Senior leaders will bolster software security’s crucial role in digital transformation for enterprises

Continue Reading >>

Join Us for Cocktails During the Velocity Conference on June 21st

Continue Reading >>

How Contrast Protect Out-Firewalls Web Application Firewalls (WAFs)

Contrast Protect helps to secure software applications in a radically better way than legacy tools like web application firewalls (WAFs). Contrast operates from within your application, moving and scaling with the app, providing accurate attack..

Continue Reading >>

CAS: The Best Way to Modernize Application Security

In case you don't recognize the acronym, "CAS" stands for Continuous Application Security. It may not become a household name, but here at Contrast we believe it will be as common as "WAFs" within our industry.  CAS will help lead the way to..

Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook