<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=113894&amp;fmt=gif">

SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

The Last Mile of Application Security & Integrated Development Environments

The Last Mile … a colloquial term that translates to: the final leg of a journey. For example, folks who take public transportation refer to the last mile as the distance between where you are dropped off at the public stop and the distance to your..

Continue Reading >>

How to Develop More Secure Software & the 2018 Cybersecurity Excellence Awards

The subject of security in the area of software development is an important one, as there are a number of different challenges that developers face while trying to develop more secure software. Steve Feldman, our Vice President of Engineering, was..

Continue Reading >>

Contrast Protect + WAF = Full Application Security Monitoring

WAFs have Key Limitations

We consistently hear growing frustrations from customers about their WAF implementations and have made a commitment as a software security company to help them address those limitations, whether they continue using their..

Continue Reading >>

Get the Most Out of Your WAF Investment while Stopping the Next Struts 2 Attack

WAF + ASM: Full Protection for Your Running Application

Contrast built and marketed Contrast Protect as a “WAF killer;” a better, more accurate and scalable way to protect your web applications in production. However, our customers told us something..

Continue Reading >>

Open Source Software (OSS) is the Turbo Charger of Innovation

Software is at the heart of Digital Transformation, and organizations are using software more than ever for economic and productivity purposes in order to transform the way they run their business – to address customer needs, for better customer..

Continue Reading >>

Thoughts on Modern Security Practices and Security Frameworks

How have modern assets like cloud instances, web-based applications, mobile devices, application containers, and others affected your security and risk management program?

It's way past time for organizations to realize how ridiculous it is to..

Continue Reading >>

Newest Contrast Labs' Report: State of Application Security - Libraries & Software Composition Analysis

Contrast Security has introduced a new report series, “State of Application Security,” based on research efforts by Contrast Labs. The data for these studies was gathered directly and continuously from within running applications and APIs using..

Continue Reading >>

The Case for Application Security Monitoring

Monitoring the Security of a Running Application has Been a Guessing Game

Until recently, we knew little to nothing about the security state inside a running application – unless developers built in custom logging. Without security visibility,..

Continue Reading >>

Google Docs May Still be Vulnerable to Phishing Attacks

On Tuesday, users of Google Docs were targeted with an email phishing attack. The email content was a ruse to trick folks into granting access to their contact data. Google quickly put measures into place to stop the attack. Please visit this..

Continue Reading >>

Portable Builds with Docker

At Contrast, we like to enable developers to solve their own problems without submitting tickets to the Operations team. We also like to define our infrastructure with code.

Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook