Skip to content

AppSec Observer: Contrast Protect

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Critical zero-day Confluence RCE vulnerability blocked by Contrast Runtime Security

    Critical zero-day Confluence RCE vulnerability blocked by Contrast Runtime Security

    If your organization is running an older version of Atlassian Confluence Server that’s affected by CVE-2023-22527 — the..

    Scaling security with the speed of modern software development

    Scaling security with the speed of modern software development

    What if you could instantly prevent 95%* of the vulnerabilities in your running applications from being exploited? With..

    Contrast Security Protect shields applications from zero-day attacks

    Contrast Security Protect shields applications from zero-day attacks

    Contrast Security’s Protect solution helps midsize and growth companies defend against emerging zero-day..

    Open source brings security risk, but SCA & RASP can help

    Open source brings security risk, but SCA & RASP can help

    For a deep dive on the security risks of OSS, listen to Contract CPO Steve Wilson’s conversation with Secure Talk. How..

    Log4j still an issue, but CodeSec audit can help

    Log4j still an issue, but CodeSec audit can help

    Landing on the incident response boards for software engineering teams worldwide in December 2021, the Log4j..

    Contrast Labs: Apache Struts CVE-2020-17530

    Contrast Labs: Apache Struts CVE-2020-17530

    On December 8, 2020, Apache published a security bulletin providing details for CVE-2020-17530, a forced double..

    Contrast Labs: Blocking Spring View Manipulation Attacks

    Contrast Labs: Blocking Spring View Manipulation Attacks

    Contrast Security - Application Flow Map

    Why Application Flow Maps Are the Coolest Feature in Application Security

    Application flow maps are the cool feature you can use to discover that needle in a haystack—how does my running app..

    Why Blue Teams Need RASP: Continuous Application Threat Monitoring with Runtime Exploit Prevention

    Runtime Application Self-Protection (RASP) adds threat visibility and security control to application runtimes so you..