Skip to content

AppSec Observer: RASP (2)

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    What You Need to Know About the New IAST and RASP Guidelines in NIST 800-53

    What You Need to Know About the New IAST and RASP Guidelines in NIST 800-53

    RASP vs WAF Comparison: Why You Need Both to Protect Your Web Applications

    RASP vs WAF Comparison: Why You Need Both to Protect Your Web Applications

    One thing that you learn in the technology space is that change is constant. Companies, solutions, and people who sit..

    Why Blue Teams Need RASP: Continuous Application Threat Monitoring with Runtime Exploit Prevention

    Runtime Application Self-Protection (RASP) adds threat visibility and security control to application runtimes so you..

    process-zip-files

    Pulling Back the Curtain On: Zip File Overwrites

    Zip file overwrites are a cool but rare vulnerability that can occur on apps that work with user-supplied zip files...

    signature-binary

    Pulling Back the Curtain on RASP

    If you set out to build a new WAF today (which, believe it or not, people are still doing), everyone would have some..

    Contrast Protect + WAF: A Day in the Life of a User

    A Web Application Firewall can watch network data, but the architecture does not enable them to see how that data is..