Skip to content

AppSec Observer

The latest trends and tips in DevSecOps through instrumentation and security observability. Learn about real-world insight and “in-the-trenches” experiences on topics ranging from application and information security to DevOps and risk management.

Subscribe to Blog
Partner or die: Expanding your SaaS footprint in down markets

Partner or die: Expanding your SaaS footprint in down markets

It is predicted that 2023 will be a challenging year for almost every market, especially the high-tech sector. An..

Cybersecurity Insights with Contrast CISO David Lindner | 1/27

Cybersecurity Insights with Contrast CISO David Lindner | 1/27

Insight #1 " It really is time for LastPass users to stop using it. They have had many breaches over the past few..

Stop risking cloud security with over-permissive Cloud Custodian roles

Stop risking cloud security with over-permissive Cloud Custodian roles

Configuring permissions for Cloud Custodian functions can be tricky. 

Devs, are you ready to put privacy nutrition labels on your code?

Devs, are you ready to put privacy nutrition labels on your code?

Happy new year to all of us whose eyes have crossed trying to read our cumulative (and ever-growing)  ~1 million-word..

Cybersecurity Insights with Contrast CISO David Lindner | 1/20

Cybersecurity Insights with Contrast CISO David Lindner | 1/20

Insight #1 " Being a great security leader takes empathy and an ability to make hard decisions. It is not someone who..

Cybersecurity Insights with Contrast CISO David Lindner | 1/13

Cybersecurity Insights with Contrast CISO David Lindner | 1/13

Insight #1 " SBOMS are coming to fruition. Two major components to work through are the creation of an SBOM by..

Sussing out rusty security links in your software supply chain

Sussing out rusty security links in your software supply chain

Let’s talk about rusty supply chains. But first, let’s talk about chocolate. 

Cybersecurity Insights with Contrast CISO David Lindner | 1/6

Cybersecurity Insights with Contrast CISO David Lindner | 1/6

Insight #1 " If your source code is leaked, the first thing you need to do is make sure the malicious actors are not..

Ditch your setlist: Zero-day partiers are already rocking your system

Ditch your setlist: Zero-day partiers are already rocking your system

Zero-day exploits are on the rise, and the way you’re trying to handle them isn’t working.