Skip to content

AppSec Observer

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Cybersecurity Insights with Contrast CISO David Lindner | 10/13

    Cybersecurity Insights with Contrast CISO David Lindner | 10/13

    Insight #1 Google is now defaulting to the use of passkeys for authentication. This is a huge step in increasing the..

    6 of the biggest GitHub application security threats

    6 of the biggest GitHub application security threats

    GitHub is the Megladon of source code hosts, and as such, it sports a gargantuan bulls-eye that flashes neon to hackers..

    Cybersecurity Insights with Contrast CISO David Lindner | 10/6

    Cybersecurity Insights with Contrast CISO David Lindner | 10/6

    Insight #1 AI voice cloning is a problem: It’s reportedly taken the top spot in scam trends, particularly targeting..

    The top 8 AWS root user account best practices

    The top 8 AWS root user account best practices

    Amazon Web Services (AWS) has revolutionized the way organizations manage their IT infrastructure and applications...

    Contrast Security champions Cybersecurity Awareness Month: #SecureOurWorld

    Contrast Security champions Cybersecurity Awareness Month: #SecureOurWorld

    Contrast is once again proud to be a Champion for Cybersecurity Awareness Month throughout October, to help in..

    Cybersecurity Insights with Contrast CISO David Lindner | 9/29

    Cybersecurity Insights with Contrast CISO David Lindner | 9/29

    Insight #1 For years — since 2018 — the National Institute of Standards and Technology (NIST) has said that password..

    Learn about the hidden dangers of traditional AppSec tools and why Runtime Security is replacing them: podcast writeup

    Learn about the hidden dangers of traditional AppSec tools and why Runtime Security is replacing them: podcast writeup

    Are traditional AppSec tools keeping up with advances in software? That was the question The Application Security..

    Your WAF doesn't have your back

    Your WAF doesn't have your back

    Why WAFs leave you adrift in the treacherous waters of cybersecurity In the ever-shifting currents of the cybersecurity..

    Cybersecurity Insights with Contrast CISO David Lindner | 9/22

    Cybersecurity Insights with Contrast CISO David Lindner | 9/22

    Insight #1 There will always be a balance in the psychological acceptability of any security controls put on users...