AppSec Observer: OpenSourceSoftware
Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability. Learn about real-world insight and “in-the-trenches” experiences on topics ranging from application and information security to DevOps and risk management.
Subscribe NowTopics
- Thought Leaders
- Application Security
- Contrast News
- DevOps
- AppSec
- Hacked
- vulnerabilities
- Threat
- DevSecOps
- Product
- CodeSec
- RASP
- Security
- API security
- Contrast Protect
- Metrics
- AWS
- Contrast Assess
- Runtime Security
- SCA
- cybersecurity
- APIs
- OSS
- IAST
- Serverless
- AI
- scan
- Contrast Scan
- GitHub
- JavaScript
- SAST
- cybersecurity awareness month
- runtime protection
- CISA
- CISO
- OpenSource
- backlog
- incident response
- java
- python
- software development
- threat modeling
- .Net
- .Net
- CVE
- Cloud Native Security
- Community Edition
- Contrast SCA
- DHS
- Go
- Lambda
- Log4j
- MTTR
- RSA
- React
- Security Observability
- WAF
- attack
- awareness
- jQuery
- passwords
- remediation
- supply chain
- threat detection
- workplace
- AST
- Angular
- Article 25
- Awards
- Below the Waterline
- CISO Insights
- CISOs
- Console
- Cyber Bank Heists
- DAST
- DORA
- Dependabot
- Developers
- Digital Operational Resilience Act
- Drupal
- European Union
- Gartner Peer Insights
- Git
- GitHub Action
- Known Exploited Vulnerabilities
- MLflow
- Namasday
- OpenSourceSoftware
- PATs
- Regulation (EU) 2022/2554
- Ruby
- SQL injection
- TypeScript
- application attacks
- authentication security
- benefits
- best practices
- breach
- burnout
- compliance
- containers
- corporate culture
- crime
- cybercrime
- digital resilience
- false positive
- financial
- financial institutions
- financial sector
- github application security
- github secure code
- github security scanning
- happiness
- hiring
- labor shortage
- languages
- machine learning
- malicious actors
- observability
- okta
- organized crime
- passkeys
- penetration testing
- perks
- personal access tokens
- regulation
- regulatory
- retention
- root account
- sbom
- scams
- security blueprint
- security culture
- security monitoring
- shift smart
- voice cloning
- voice of the customer
- vue.js
- work-life balance
- zero-day
Loving our content? Subscribe now!
Get the latest content from Contrast directly to your mailbox. By subscribing, you will stay up to date with all the latest and greatest from Contrast.