Skip to content

AppSec Observer

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Anatomy of an attack

    Anatomy of an attack

    In today's rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting..

    Cybersecurity Insights with Contrast CISO David Lindner | 09/20/24

    Cybersecurity Insights with Contrast CISO David Lindner | 09/20/24

    Insight #1: Don't shrug off this internet plague! Cross-site scripting (XSS) is the overlooked vulnerability plaguing..

    August attack data: A look beyond the numbers

    August attack data: A look beyond the numbers

    The Contrast Security Runtime Security Platform — the engine that underpins Contrast’s Application Detection and..

    Cybersecurity Insights with Contrast CISO David Lindner | 09/13/24

    Cybersecurity Insights with Contrast CISO David Lindner | 09/13/24

    Insight #1 Where should a CISO focus — on immediate threats, or on long-term security? The answer is “both.” A..

    Cybersecurity Insights with Contrast CISO David Lindner | 9/6/24

    Cybersecurity Insights with Contrast CISO David Lindner | 9/6/24

    Insight #1: SQL injection baffles airport security You mean to say that SQL Injection is still a problem? How many more..

    Award Finalist: Contrast Security Application Detection and Response

    Award Finalist: Contrast Security Application Detection and Response

    Less than a month after we at Contrast Security announced Application Detection and Response (ADR), it is already a..

    Understanding ADR’s detection and response layers

    Understanding ADR’s detection and response layers

    Airport security is a lot like cybersecurity. Each is a cumbersome process aimed at protecting valuable assets. Both..

    Cybersecurity Insights with Contrast CISO David Lindner | 8/30/24

    Cybersecurity Insights with Contrast CISO David Lindner | 8/30/24

    Insight #1: North Korean IT spies The threat of state-sponsored cyber espionage is real and evolving. Recent reports..

    Why application detection and response is sparking excitement in cybersecurity

    Why application detection and response is sparking excitement in cybersecurity

    What is it about the rise of application detection and response (ADR) that’s exciting cybersecurity experts?