SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

Contrast Security Recognized as a Gartner Peer Insights Customers' Choice for Application Security Testing

In the 2019 Gartner Peer Insights ‘Voice of the Customer’ Contrast Security received:

Continue Reading >>

July 2019 AppSec Intelligence Report: Attack Edition

July 2019 AppSec Intelligence Report: Attack Edition

Continue Reading >>

June 2019 AppSec Intelligence Report: Attack Edition

What is this report: This report summarizes Contrast Labs' analysis of real world application attack data from June 2019. It utilizes data from attacks that Contrast observed over the previous months and highlights the key trends found. 

Continue Reading >>

Contrast Security Honored as a Silver Stevie® Award Winner in the 2019 American Business Awards® for Best Business Technology Software - DevOps Solution

We are proud to announce that Contrast Security has been named a Silver Stevie Award winner for Best Business Technology Software - DevOps Solution in the 17th annual American Business Awards.

Continue Reading >>

How do teams stay afloat in an ocean of vulnerabilities? They remediate faster (3.0x FASTER!)

As a developer, working through your team's bug backlog can sometimes feel like bailing out a rowboat with only a leaky bucket. As a security leader, working through the backlog for your entire application portfolio can feel like bailing out a..

Continue Reading >>

"BETTER" Security in 2019 - Lessons from RSA

We’ve recently wrapped up a dynamic week at RSA 2019 in San Francisco where we had over 500 visitors to our booth, executive meetings and won the Cyber Defense Magazine Award for Editor’s Choice Application Security. It’s a good time to reflect..

Continue Reading >>

CONTRAST LABS: March 2018 AppSec Intelligence Report

Contrast Labs' analysis of real world application security data from March 2018. We're going to change it up a bit this month by expanding our coverage to include:

  • Both known and unknown vulnerabilities in custom code
  • Both known and unknown..
Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook