Skip to content

Joe Coletta, Product Marketing Manager, Contrast Security

Joe Coletta is a Sr. Product Marketing Manager at Contrast Security focusing on Open Source Security. Entering the AppSec field as a Security Program Manager, Joe has consulted dozens of organizations of varying sizes on how to work cross-functionally in order to scale their application security programs. Applying this frontline knowledge to a product marketing career, Joe develops go-to-market resources that capture the voice of AppSec practitioners in both Security and Development. On a personal note, Joe divvies his free time between reading, drawing, and Brazilian Jiu Jitsu

Subscribe to Blog
Contrast Scan now supports security testing for C# applications for .NET Web Forms

Contrast Scan now supports security testing for C# applications for .NET Web Forms

Contrast is pleased to announce another major milestone in our expanding breadth of coverage for Contrast Scan...

ESG analyst discusses how to ship secure, tested code and rapidly remediate issues without headaches

ESG analyst discusses how to ship secure, tested code and rapidly remediate issues without headaches

Securing the DevOps pipeline can be a challenge, even for companies that have security in their DNA. And you're not..

New Gartner® Report Details How Businesses Should Incorporate SBOMS Into The SDLC

New Gartner® Report Details How Businesses Should Incorporate SBOMS Into The SDLC

The proliferation of third-party software, especially open-source software (OSS), is a mainstay in modern development...

GitHub Actions Blog Series, Part 1: Pipeline Native Code Analysis

GitHub Actions Blog Series, Part 1: Pipeline Native Code Analysis

Contrast Security, the leader in next-gen code security, today announced its partnership with GitHub and the..

Three Reasons Why Contrast SCA Is Best Suited for Log4Shell Rapid Response

Three Reasons Why Contrast SCA Is Best Suited for Log4Shell Rapid Response

With Log4j being such a ubiquitous library embedded in tens of millions applications across the Java ecosystem, it’s..

SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)

SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)

As readers of the AppSec Observer blog are aware, application attacks have continued unabated throughout the massive..

Understanding Software Supply Chain Risks and How to Mitigate Them

Understanding Software Supply Chain Risks and How to Mitigate Them

As demand for new applications continues to rise, developers are adapting new tools and techniques to accelerate their..

What Security Lessons Can Come From the Kaseya Ransomware Attack?

What Security Lessons Can Come From the Kaseya Ransomware Attack?

This year will be remembered as annus horribilis for attacks against the software supply chain. In the first half of..

Contrast Security’s Approach to SCA Enables Vulnerability Prioritization and Faster Remediation

Contrast Security’s Approach to SCA Enables Vulnerability Prioritization and Faster Remediation

Open Source Is a Mainstay in Modern Development It goes without saying that modern applications are rarely built from..