<iframe src="//www.googletagmanager.com/ns.html?id=GTM-WQV6DT" height="0" width="0" style="display:none;visibility:hidden">

SECURITY INFLUENCERS BLOG

Security influencers provide real-world insight and “in-the-trenches” experiences on topics ranging from application security to DevOps and risk management

Application Security

7 Things to Ask Yourself About Software Security

Cathy Lemeshewsky | March 22, 2017

Software affects virtually every aspect of an individual – finances, safety, government, communication, businesses, and even happiness. Vulnerable software applications are a leading cause of enterprise data breaches,[1] creating headaches for IT..

Read More

Application Security- Contrast News

Crash Testing your Connected Stuff — Before you Get Hacked!

Christine Carrig, Director of Marketing | March 13, 2017

People have to pay to subscribe to Consumer Reports. But you may benefit from a new wave of security testing — for free. According to Archer News you may soon be able to tell if that "thing" you want to buy will keep you safe from hackers or..

Read More

Application Security

It’s Still Flu Season: Get a Flu Shot! Masks Won’t Help — Same Goes for AppSec — Read a WAF Comparison

Mahesh Babu | February 24, 2017

Come flu season, you have two options – cover your face with a mask and hope you don’t catch anything. Or, do the responsible thing: get a flu shot and protect your entire body and immune system from within. For your software applications, it’s..

Read More

Application Security- Thought Leaders

What is OWASP, and Why it Matters for AppSec

Christine Carrig, Director of Marketing | February 23, 2017

Vulnerability research conducted by Contrast Labs was referenced in an article "What is OWASP and Why it Matters for AppSec." The Network World article, written by Michelle Drolet, discusses OWASP and why it proves the need for modern,..

Read More

Application Security- Thought Leaders

Ditch Your Web Application Firewall (WAF) — 3 Reasons Why

Christine Carrig, Director of Marketing | January 27, 2017

It is time… time to ditch traditional approaches to the way we have managed application security. Specifically, it’s time to ditch your Web Application Firewalls (WAFs). Ten to fifteen years ago, WAFs were revolutionizing the way we thought of..

Read More

Application Security

Automating Application Security in Modern Software Projects

Jeff Williams, Co-Founder, Chief Technology Officer | January 19, 2017

Today, it seems like every organization has become a software company.

The increasing dependence on automation demands that software survive and thrive despite an increasingly hostile environment.

Insecure code has become the leading security..

Read More

Application Security

The Four Dimensions of Application Security "Coverage"

Jeff Williams, Co-Founder, Chief Technology Officer | August 17, 2016

For many application security vendors, "coverage" is the third rail — but it's a critical part of your application security strategy... maybe the most critical.

If you're a CISO, appsec program manager, or anyone else charged with application..

Read More

Application Security- Product

Integrations Make Managing AppSec Even Easier!

Jeff Whalen, Principal Product Manager, Contrast Security | August 16, 2016

At Contrast Security, we believe that application security should be pervasive and transparent.  Application security should work within the application development lifecycle instead of modifying it to fit the way the AppSec tool works.  To that..

Read More

Application Security

Can Openness in the US Government Lead to Better Application Security?

Jeff Williams, Co-Founder, Chief Technology Officer | August 12, 2016

On Tuesday morning, ZDNet reported that U.S. government has published a new federal policy that aims to encourage more agencies to open-source custom code they’ve developed.

Read More

Application Security

With Only a Hammer, Everything Looks Like a Security Vulnerability!

Jeff Williams, Co-Founder, Chief Technology Officer | July 28, 2016

Did you know that most security vulnerabilities are simply the result of failing to use the right security control in the right place?

Read More

SIGN UP FOR BLOG UPDATES

"When we instrumented applications at the UK's largest Government Department with Contrast Assess, it was like handing our project teams an incredibly powerful debugging agent containing the sum total of application security knowledge.” 

Declan O'Riordan
Security Testing Manager
Testing IT, Ltd.
continuous-application-security
Laptop-Blue-Bg.jpg

schedule a demo now

Discover how easy it is to spot & stop attacks in real-time.
Laptop.png
Get Demo