Skip to content

AppSec Observer

The latest trends and tips in DevSecOps through instrumentation and security observability. Learn about real-world insight and “in-the-trenches” experiences on topics ranging from application and information security to DevOps and risk management.

Subscribe to Blog
Building a modern API security strategy — API components

Building a modern API security strategy — API components

Part three of the five-part series, Building a modern API security strategy.

Debunking IAST myths

Debunking IAST myths

If you have followed Contrast's progress over the years, you will recognize us as a leading provider of Interactive..

How to detect Log4j vulnerabilities in Java projects for free with CodeSec

How to detect Log4j vulnerabilities in Java projects for free with CodeSec

Log4j is a popular Java logging tool with a critical cybersecurity vulnerability that gained global attention in..

Cybersecurity Insights with Contrast CISO David Lindner | 8/5

Cybersecurity Insights with Contrast CISO David Lindner | 8/5

Insight #1 " Are you paying if you get hit with ransomware? I provided my thoughts here. The reality shows that most..

Building a modern API security strategy — API testing

Building a modern API security strategy — API testing

Part two of the five-part series, Building a modern API security strategy.

Cybersecurity Insights with Contrast CISO David Lindner | 7/28

Cybersecurity Insights with Contrast CISO David Lindner | 7/28

Insight #1 "According to recent research, hackers are now scanning for vulnerabilities within 15 minutes of disclosure...

Building a modern API security strategy — API inventory

Building a modern API security strategy — API inventory

Part one of the five-part series, Building a modern API security strategy.

Cybersecurity Insights with Contrast CISO David Lindner | 7/22

Cybersecurity Insights with Contrast CISO David Lindner | 7/22

Insight #1 "Log4j was classified as an “endemic” by the Cyber Safety Review Board this week. It’s really great to see..

Building a modern API security strategy: A five-part series — Overview

Building a modern API security strategy: A five-part series — Overview

The Spring4Shell exploit was, really, quite elegant.