<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=113894&amp;fmt=gif">

SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

Mark Hodgson, Vice President of Marketing

Mark's extensive experience spans over 28 years in marketing high-tech products and services to consumers and corporations. Specific area of expertise is application security and mobile application security.

PRESS RELEASE: Contrast Security Announces Microsoft Ventures and AXA Strategic Ventures as Global Strategic Investors

Investments signal criticality of securing software applications in the Cloud and DevOps

Los Altos, Calif. — December 7, 2017 —  Contrast Security, the pioneer in enabling “self-protecting” software with security safeguards built directly into..
Continue Reading >>

PRESS RELEASE:  Contrast Enables Customers to Move Securely to the Cloud with Self-Protecting Software

New product capabilities to enable integration with AWS Elastic Beanstalk, Amazon EC2 and Amazon RDS

Los Altos, Calif. — Nov. 15, 2017 — Contrast Security, a pioneer in enabling “self-protecting” software with security safeguards built directly into..

Continue Reading >>

PRESS RELEASE:  Contrast Security, A Pioneer in Securing Critical Software, Closes $30 Million in Series C Financing

Round led by Battery Ventures validates “self-protecting” software and sets standard for application security; Equifax breach shows criticality of sector

Los Altos, Calif. — October 19, 2017 — Contrast Security, the pioneer in enabling..

Continue Reading >>

PRESS RELEASE: Software Libraries Represent Just Seven percent of Application Vulnerabilities

Los Altos, Calif. – July 24, 2017 – Contrast Labs, the research arm of Contrast Security, the first company to enable self-protecting software, today announced its State of Application Security: Libraries & Software Composition Analysis Report. The..

Continue Reading >>

Contrast Security Awarded a 2017 Red Herring Top 100 North America Winner

Last week, Red Herring announced the winners of its Top 100 North America 2017 event, recognizing the continent’s most exciting and innovative private technology companies.  We’re delighted to announce that Contrast Security made the Top 100! 

Continue Reading >>

PRESS RELEASE:  Contrast Brings Security into the DevOps Era

Latest Product Enhancements and Integrations Support Companies using Agile and DevOps to Deliver on Digital Transformation Initiatives

Los Altos, Calif. – June 20, 2017Contrast Security, the first company to enable self-protecting software,..

Continue Reading >>

Are You Ready to Automate Security Testing? Meet DevSecOps.

It is no secret that software applications today are complex and can potentially be riddled with many different security issues. From bad code to misconfigured servers and everything in between, solving this problem requires security implications to

Continue Reading >>

Contrast Security Honored as Gold Stevie Award Winner in 2017 American Business

Contrast Security was named the winner of a Gold Stevie® Award in the New Product or Service of the Year - Software Development Solution category in the 15th Annual American Business Awards. Details about The American Business Awards and the list of..

Continue Reading >>

The New OWASP Top 10 for 2017 Reveals New Critical Weakness in Application Defenses

The OWASP Top 10 - 2017 reflects a move towards modern, high-speed software development that we’ve seen explode across the industry since the last version of the Top 10 in 2013. 

While many of the vulnerabilities remain the same, the addition of..

Continue Reading >>

Rollback of FCC privacy requirements could have broad repercussions

Last week the United States Congress made the rather unsettling decision to roll-back FCC privacy regulations that prohibited ISPs from selling customers' browser history and other personal information without their permission.  This decision could..

Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook