Skip to content

Contrast Marketing

Subscribe Now
    Topics
    85% of Developers in the Technology Industry Deploy Daily, Yet 8 in 10 Aren’t Going Fast Enough

    85% of Developers in the Technology Industry Deploy Daily, Yet 8 in 10 Aren’t Going Fast Enough

    Organizations aspire to reach perfection and often look to emulate best practices of peer organizations to do so. When..

    Authenticated Remote Code Execution in OpenMRS

    Authenticated Remote Code Execution in OpenMRS

    Early in May of 2020, Contrast Labs was exploring different ways in which we could help the community or world combat..

    XML External Entity (XXE) Attack Vulnerability and JAXB Pitfalls

    XML External Entity (XXE) Attack Vulnerability and JAXB Pitfalls

    The Java XML Binding (JAXB) runtime that ships with OpenJDK 1.8 uses a default configuration that protects against XML..

    security-observability

    WHY OBSERVABILITY IS THE NEXT BIG THING IN SECURITY

    Accelerate cloud migrations with security observability across your development life cycle.

    Apache Struts CVE-2019-0230 Vulnerabilities and How to Block Attacks

    Apache Struts CVE-2019-0230 Vulnerabilities and How to Block Attacks

    Note: Special thanks to Alvaro Muñoz (https://twitter.com/pwntester) for correcting us on some very important technical..

    Contrast Application Security Platform Accepted Into Department of Defense Platform One

    Contrast Application Security Platform Accepted Into Department of Defense Platform One

    The U.S. Department of Defense (DoD) takes cybersecurity to new levels. Platform One, a program based out of the U.S...

    social-media-role-discovering-vulnerabilities

    What Role Should Social Media Play in Discovering Vulnerabilities?

    New research from the Pacific Northwest National Laboratory (PNNL) Data Sciences and Analytics Group shows that 25% of..

    The Risks Associated with OSS and How to Mitigate Them

    The Risks Associated with OSS and How to Mitigate Them

    Open source has become nearly ubiquitous with Agile and DevOps. It offers development teams the ability to quickly and..

    Application Vulnerabilities Spike, .NET Applications Appear in the Attack Crosshairs

    Application Vulnerabilities Spike, .NET Applications Appear in the Attack Crosshairs

    COVID-19 transformed businesses overnight. Suddenly, more than half of the workforce found themselves working from home..