<iframe src="//www.googletagmanager.com/ns.html?id=GTM-WQV6DT" height="0" width="0" style="display:none;visibility:hidden">

SECURITY INFLUENCERS BLOG

Security influencers provide real-world insight and “in-the-trenches” experiences on topics ranging from application security to DevOps and risk management

How Contrast Protect Out-Firewalls Web Application Firewalls (WAFs)

Contrast Protect helps to secure software applications in a radically better way than legacy tools like web application firewalls (WAFs). Contrast operates from within your application, moving and scaling with the app, providing accurate attack..

Continue Reading

That Vulnerability is How Old?

Recently, as our customers have looked at scaling out their Contrast deployments throughout their development lifecycle, one of the most requests I heard more and more was “Can Contrast help me to track and measure how we are doing against our..

Continue Reading

Application Security Integrations: Start Slacking!

If you’re one of the three million daily active users of Slack, then chat based-collaboration is something that is very important to you.  We also embrace it here at Contrast Security. 

In our latest release of Contrast Enterprise, an integration..

Continue Reading

Integrations Make Managing AppSec Even Easier!

At Contrast Security, we believe that application security should be pervasive and transparent.  Application security should work within the application development lifecycle instead of modifying it to fit the way the AppSec tool works.  To that..

Continue Reading

Advantages of Interactive Application Security Testing (IAST) over Static and Dynamic Testing

Interactive Application Security Testing (IAST) works in fundamentally different ways than static or dynamic tools using instrumentation technology. IAST leverages information from inside the running application, including runtime requests, data..

Continue Reading

Introducing Contrast for Microsoft .NET

Yesterday we (Contrast Security) announced availability of our Contrast agent for Microsoft .NET. We wanted to first take this opportunity to thank our Beta testers, developers, and everyone else involved in getting this incredibly useful product..

Continue Reading

Getting Left of Boom: Using FireEye and Contrast Together

The term "Left of Boom" is a military term used to describe the time before the explosion of an improvised explosive device (IED), aka a roadside bomb. Made popular by Pulitzer-Prize winning author Rick Atkinson, the military term left of boom..

Continue Reading

Interactive Application Security: Frequently Asked Questions

Contrast doesn't neatly fall into either the static analysis (SAST) or dynamic analysis (DAST) categories most security experts ask about. Because of that, we often field questions about what exactly and Contrast does. This post will answer a few..

Continue Reading

ColdFusion and Application Security

Contrast Now Supports Securing ColdFusion!Even before adding support for .NET, the Contrast team had planned to support ColdFusion. Let's go through our preferred customer checklist:

Continue Reading

Better Application Vulnerability Detection with Advanced Data Tagging

I've been reviewing code for security problems for about 15 years now.  I'm privileged to have seen the code for many of the world's most critical applications.  And I've also had a lot of time to think about how we can find vulnerabilities..

Continue Reading

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook