Skip to content

AppSec Observer: Application Security (3)

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Application Vulnerabilities Spike, .NET Applications Appear in the Attack Crosshairs

    Application Vulnerabilities Spike, .NET Applications Appear in the Attack Crosshairs

    COVID-19 transformed businesses overnight. Suddenly, more than half of the workforce found themselves working from home..

    How to Accurately and Continuously Identify and Remediate OSS Library Risks

    How to Accurately and Continuously Identify and Remediate OSS Library Risks

    cyberattacks-applications-grow-exponentially

    Cyberattacks on Applications Grow Exponentially, Pose Serious Risk

    The need for digital engagement with customers, partners, and employees has never been greater than it is today. Most..

    Application Security Risk Is 1.7x Higher for Organizations That Fail to Manage Security Debt

    Application Security Risk Is 1.7x Higher for Organizations That Fail to Manage Security Debt

    Analyzing data captured from June 2019 to May 2020, Contrast Labs found that applications experienced over 13,000..

    Legacy SAST and the Fallacy of 100% Code Coverage

    Legacy SAST and the Fallacy of 100% Code Coverage

    In October of 2019, three months into my tenure at Contrast Security, I received a challenge question from a customer..

    Manual Application Vulnerability Management Delays Innovation While Increasing Business Risk

    Manual Application Vulnerability Management Delays Innovation While Increasing Business Risk

    Traditional approaches to application security (AppSec), such as legacy static application security testing (SAST) and..

    Accuracy in AppSec Is Critical to Reducing False Positives

    Accuracy in AppSec Is Critical to Reducing False Positives

    According to a new report from the Neustar International Security Council (NISC), over one-quarter of security alerts..

    Protect Sensitive Data, Reduce Risk, and Gain Regulatory Compliance with Embedded Data Security

    Protect Sensitive Data, Reduce Risk, and Gain Regulatory Compliance with Embedded Data Security

    Sensitive data often leaks out through applications. The privacy risk is not developer negligence, but rather misplaced..

    Contrast Labs: Mapping Risk Profiles for Select OWASP Top 10 Vulnerabilities to Understand Their AppSec Risk

    Contrast Labs: Mapping Risk Profiles for Select OWASP Top 10 Vulnerabilities to Understand Their AppSec Risk

    At Contrast Security, the Contrast Labs team is charged with numerous things. Part of this charter includes looking at..