Skip to content

AppSec Observer: Contrast Protect

The latest trends and tips in DevSecOps through instrumentation and security observability. Learn about real-world insight and “in-the-trenches” experiences on topics ranging from application and information security to DevOps and risk management.

Subscribe to Blog
Contrast Security Protect shields applications from zero-day attacks

Contrast Security Protect shields applications from zero-day attacks

Contrast Security’s Protect solution helps midsize and growth companies defend against emerging zero-day..

Open source brings security risk, but SCA & RASP can help

Open source brings security risk, but SCA & RASP can help

For a deep dive on the security risks of OSS, listen to Contract CPO Steve Wilson’s conversation with Secure Talk. How..

Log4j still an issue, but CodeSec audit can help

Log4j still an issue, but CodeSec audit can help

Landing on the incident response boards for software engineering teams worldwide in December 2021, the Log4j..

Contrast Labs: Apache Struts CVE-2020-17530

Contrast Labs: Apache Struts CVE-2020-17530

On December 8, 2020, Apache published a security bulletin providing details for CVE-2020-17530, a forced double..

Contrast Labs: Blocking Spring View Manipulation Attacks

Contrast Labs: Blocking Spring View Manipulation Attacks

 

Contrast Security - Application Flow Map

Why Application Flow Maps Are the Coolest Feature in Application Security

Application flow maps are the cool feature you can use to discover that needle in a haystack—how does my running app..

RASP-cover

Why Blue Teams Need RASP: Continuous Application Threat Monitoring with Runtime Exploit Prevention

Runtime Application Self-Protection (RASP) adds threat visibility and security control to application runtimes so you..

Coalfire PCI Compliance & Contrast Security

Contrast Assess and Protect recently went through an independent evaluation by CoalFire, a respected Payment Card..

Contrast Protect + WAF: A Day in the Life of a User

A Web Application Firewall can watch network data, but the architecture does not enable them to see how that data is..