Skip to content

Joe Coletta, Product Marketing Manager, Contrast Security

Joe Coletta is a Sr. Product Marketing Manager at Contrast Security focusing on Open Source Security. Entering the AppSec field as a Security Program Manager, Joe has consulted dozens of organizations of varying sizes on how to work cross-functionally in order to scale their application security programs. Applying this frontline knowledge to a product marketing career, Joe develops go-to-market resources that capture the voice of AppSec practitioners in both Security and Development. On a personal note, Joe divvies his free time between reading, drawing, and Brazilian Jiu Jitsu

Subscribe Now
    Topics
    Contrast Scan now supports security testing for C# applications for .NET Web Forms

    Contrast Scan now supports security testing for C# applications for .NET Web Forms

    Contrast is pleased to announce another major milestone in our expanding breadth of coverage for Contrast Scan...

    ESG analyst discusses how to ship secure, tested code and rapidly remediate issues without headaches

    ESG analyst discusses how to ship secure, tested code and rapidly remediate issues without headaches

    Securing the DevOps pipeline can be a challenge, even for companies that have security in their DNA. And you're not..

    New Gartner® Report Details How Businesses Should Incorporate SBOMS Into The SDLC

    New Gartner® Report Details How Businesses Should Incorporate SBOMS Into The SDLC

    The proliferation of third-party software, especially open-source software (OSS), is a mainstay in modern development...

    GitHub Actions Security Blog: Pipeline Native Code Analysis

    GitHub Actions Security Blog: Pipeline Native Code Analysis

    Contrast Security, the leader in next-gen code security, today announced its partnership with GitHub and the..

    Three Reasons Why Contrast SCA Is Best Suited for Log4Shell Rapid Response

    Three Reasons Why Contrast SCA Is Best Suited for Log4Shell Rapid Response

    With Log4j being such a ubiquitous library embedded in tens of millions applications across the Java ecosystem, it’s..

    SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)

    SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)

    As readers of the AppSec Observer blog are aware, application attacks have continued unabated throughout the massive..

    Understanding Software Supply Chain Risks and How to Mitigate Them

    Understanding Software Supply Chain Risks and How to Mitigate Them

    As demand for new applications continues to rise, developers are adapting new tools and techniques to accelerate their..

    What Security Lessons Can Come From the Kaseya Ransomware Attack?

    What Security Lessons Can Come From the Kaseya Ransomware Attack?

    This year will be remembered as annus horribilis for attacks against the software supply chain. In the first half of..

    Contrast Security’s Approach to SCA Enables Vulnerability Prioritization and Faster Remediation

    Contrast Security’s Approach to SCA Enables Vulnerability Prioritization and Faster Remediation

    Open Source Is a Mainstay in Modern Development It goes without saying that modern applications are rarely built from..