SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

Join Us for Cocktails During the Velocity Conference on June 21st

Continue Reading >>

How Contrast Protect Out-Firewalls Web Application Firewalls (WAFs)

Contrast Protect helps to secure software applications in a radically better way than legacy tools like web application firewalls (WAFs). Contrast operates from within your application, moving and scaling with the app, providing accurate attack..

Continue Reading >>

Insights from Microsoft Build Conference 2017

At Microsoft Build in Seattle earlier this month, Microsoft presented its strategy and demonstrated its commitment to help move enterprises into the digital era. This transformation will require businesses to embrace technologies like cloud,..

Continue Reading >>

CAS: The Best Way to Modernize Application Security

In case you don't recognize the acronym, "CAS" stands for Continuous Application Security. It may not become a household name, but here at Contrast we believe it will be as common as "WAFs" within our industry.  CAS will help lead the way to..

Continue Reading >>

A CTO's Response to Trump's Cybersecurity Executive Order

In principle, holding each agency head accountable for his or her agency’s cybersecurity is logical. The problem with that is they were already accountable. When the OPM was breached, director Katherine Archuleta stepped down. And there were calls..

Continue Reading >>

Improve Application Security by Turning it into Code

Why is application security such a pain? One of the hard problems with application security is that there are a zillion different ways that things can go wrong.

Continue Reading >>

Contrast Security Honored as Gold Stevie Award Winner in 2017 American Business

Contrast Security was named the winner of a Gold Stevie® Award in the New Product or Service of the Year - Software Development Solution category in the 15th Annual American Business Awards. Details about The American Business Awards and the list of..

Continue Reading >>

Google Docs May Still be Vulnerable to Phishing Attacks

On Tuesday, users of Google Docs were targeted with an email phishing attack. The email content was a ruse to trick folks into granting access to their contact data. Google quickly put measures into place to stop the attack. Please visit this..

Continue Reading >>

DevOps Security: 6 Executive Tips For Your Security Program

ByMahesh Babu May 4, 2017

DevOps security extends DevOps processes to the software application security team within your organization. Bringing together software development and application security helps ensure that security moves from a bottleneck to an enabler...

Continue Reading >>

How AppSec Fits into the World of DevOps and Containers

ByKaushik Srinivas May 2, 2017

Business undertaking digital transformation initiatives are turning to Agile development and DevOps workflows to execute their software projects. Agile lets software teams respond quickly to customer needs, and DevOps helps organizations deploy..

Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook