SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

Security Concerns Remain with Containers and Kubernetes Per New Report

When it comes to organizational growth and the fast pace of doing business, DevOps is a key enabler in the transformation of a company. Containers play a significant role in this evolution, helping organizations to modernize faster by making it..

Continue Reading >>

Contrast Labs: Jenkins Maven HPI Plugin Exposes Developer Laptops

If you are like the development team at Contrast Security and build Jenkins plugins, then you probably find value in the maven-hpi-plugin. The Jenkins Maven HPI Plugin hpi:run target initializes a local Jetty HTTP server with the current plugin..

Continue Reading >>

Misconfigurations and Alert Fatigue Require a Modern AppSec Approach

Businesses are adopting development and operations (DevOps) to tap into new business opportunities. These DevOps initiatives are the engine driving digital transformation. But as DevOps takes hold and organizations focus more and more of their time..

Continue Reading >>

Why You Need Both a WAF and RASP to Protect Your Web Applications

One thing that you learn in the technology space is that change is constant. Companies, solutions, and people who sit on their laurels can find themselves in a position of never-ending catch up. For security operations and application security..

Continue Reading >>

Elite Performers Choose Simpler Tools

I was fascinated to read this year’s   Accelerate State of DevOps Report 2019  which now represents six years of research and data from over 31,000 professionals in our industry. It delivers insight into the practices and capabilities that..
Continue Reading >>

Stoked! The Creative Process of Street Skating and What Open Source Folks Can Learn From It

 “…all skateboarders speak a language of our own devising. We take simple movements and chunk them together in such a way that we form more complex ones.” Rodney Mullen

Continue Reading >>

How do teams stay afloat in an ocean of vulnerabilities? They remediate faster (3.0x FASTER!)

As a developer, working through your team's bug backlog can sometimes feel like bailing out a rowboat with only a leaky bucket. As a security leader, working through the backlog for your entire application portfolio can feel like bailing out a..

Continue Reading >>

"BETTER" Security in 2019 - Lessons from RSA

We’ve recently wrapped up a dynamic week at RSA 2019 in San Francisco where we had over 500 visitors to our booth, executive meetings and won the Cyber Defense Magazine Award for Editor’s Choice Application Security. It’s a good time to reflect..

Continue Reading >>

Contrast Security is Fully Compatible with Amazon Corretto

Amazon recently released Corretto, a Java 8 runtime that is fully-compatible and license-compliant. Both Contrast Assess and Protect are fully compatible with Corretto – no changes are required to code or anything else for users of Amazon’s Java..

Continue Reading >>

How Visibility and Data Unite Engineering, Security & Operations: Dev + Sec + Ops = DevSecOps

ByMahesh Babu October 13, 2017

More than ever before, the security of a running application is a shared responsibility:

  1. The security team needs to detect, monitor and respond to an application layer breach
  2. The operations team needs to ensure performance, stability & reliability..
Continue Reading >>

SUBSCRIBE TO THE BLOG