Skip to content

Joe Coletta

Joe Coletta is a Sr. Product Marketing Manager at Contrast Security focusing on Open Source Security. Entering the AppSec field as a Security Program Manager, Joe has consulted dozens of organizations of varying sizes on how to work cross-functionally in order to scale their application security programs. Applying this frontline knowledge to a product marketing career, Joe develops go-to-market resources that capture the voice of AppSec practitioners in both Security and Development. On a personal note, Joe divvies his free time between reading, drawing, and Brazilian Jiu Jitsu

Subscribe to Blog
Contrast Scan now supports C# applications for .NET Web Forms

Contrast Scan now supports C# applications for .NET Web Forms

Contrast is pleased to announce another major milestone in our expanding breadth of coverage for Contrast Scan...

ESG analyst discusses how to ship secure, tested code and rapidly remediate issues without headaches

ESG analyst discusses how to ship secure, tested code and rapidly remediate issues without headaches

Securing the DevOps pipeline can be a challenge, even for companies that have security in their DNA. And you're not..

New Gartner® Report Details How Businesses Should Incorporate SBOMS Into The SDLC

New Gartner® Report Details How Businesses Should Incorporate SBOMS Into The SDLC

The proliferation of third-party software, especially open-source software (OSS), is a mainstay in modern development...

GitHub Actions Blog Series, Part 1: Pipeline Native Code Analysis

GitHub Actions Blog Series, Part 1: Pipeline Native Code Analysis

Contrast Security, the leader in next-gen code security, today announced its partnership with GitHub and the..

Contrast Scan Adds Support for Client-Side JavaScript - The World’s Most Popular Programming Language

Contrast Scan Adds Support for Client-Side JavaScript - The World’s Most Popular Programming Language

If you’re looking for the TL;DR version of this announcement, here it is: Contrast Scan has expanded its language..

Three Reasons Why Contrast SCA Is Best Suited for Log4Shell Rapid Response

Three Reasons Why Contrast SCA Is Best Suited for Log4Shell Rapid Response

With Log4j being such a ubiquitous library embedded in tens of millions applications across the Java ecosystem, it’s..

SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)

SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)

As readers of the AppSec Observer blog are aware, application attacks have continued unabated throughout the massive..

Understanding Software Supply Chain Risks and How to Mitigate Them

Understanding Software Supply Chain Risks and How to Mitigate Them

As demand for new applications continues to rise, developers are adapting new tools and techniques to accelerate their..

What Security Lessons Can Come From the Kaseya Ransomware Attack?

What Security Lessons Can Come From the Kaseya Ransomware Attack?

This year will be remembered as annus horribilis for attacks against the software supply chain. In the first half of..