SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

43% of Data Breaches Connected to Application Vulnerabilities: Assessing the AppSec Implications

ByPatrick Spencer May 20, 2020

Web applications are a growing focus point for cyber criminals. Motivated by financial outcomes, they understand the value of the information exchanged and stored in web applications. The 2020 Verizon Data Breach Investigations Report (DBIR)..

Continue Reading >>

Contrast Community Edition Empowers Developers to Write Secure Code Faster

As software eats the world, the world faces a software security crisis. The movement to modern software such as cloud technologies and microservice architectures is essential to innovate quickly. Yet, nearly three in four developers say that..

Continue Reading >>

Contrast Protect + WAF: A Day in the Life of a User

A Web Application Firewall can watch network data, but the architecture does not enable them to see how that data is actually used. As a result, they sound an equal alarm for all attack attempts without raising the importance for attacks that could..

Continue Reading >>

7 advantages of Interactive Application Security Testing (IAST)

Interactive Application Security Testing (IAST) works in fundamentally different ways than static or dynamic tools using instrumentation technology. IAST leverages information from inside the running application, including runtime requests, data..

Continue Reading >>

Unify Security Across Teams – See How Contrast Does it in a 60-Minute Product Demonstration

More than ever before, the security of running enterprise applications is a shared responsibility between security, operations, development and engineering teams. However, all these groups are running blind when it comes to understanding the..

Continue Reading >>

SHARING IS CARING. Share Software Security Data with Development Teams, SIEMs and much more.

Contrast integrates into your SDLC, and scales to your entire application portfolio and all your stakeholders.
Deliver Security Results into Tools Your Team Already Loves

Contrast shortens feedback loops between teams by delivering results..

Continue Reading >>

How Contrast Protect Out-Firewalls Web Application Firewalls (WAFs)

Contrast Protect helps to secure software applications in a radically better way than legacy tools like web application firewalls (WAFs). Contrast operates from within your application, moving and scaling with the app, providing accurate attack..

Continue Reading >>

That Vulnerability is How Old?

Recently, as our customers have looked at scaling out their Contrast deployments throughout their development lifecycle, one of the most requests I heard more and more was “Can Contrast help me to track and measure how we are doing against our..

Continue Reading >>

Application Security Integrations: Start Slacking!

If you’re one of the three million daily active users of Slack, then chat based-collaboration is something that is very important to you.  We also embrace it here at Contrast Security. 

In our latest release of Contrast Enterprise, an integration..

Continue Reading >>

Integrations Make Managing AppSec Even Easier!

At Contrast Security, we believe that application security should be pervasive and transparent.  Application security should work within the application development lifecycle instead of modifying it to fit the way the AppSec tool works.  To that..

Continue Reading >>

SUBSCRIBE TO THE BLOG