<iframe src="//www.googletagmanager.com/ns.html?id=GTM-WQV6DT" height="0" width="0" style="display:none;visibility:hidden">

SECURITY INFLUENCERS BLOG

Security influencers provide real-world insight and “in-the-trenches” experiences on topics ranging from application security to DevOps and risk management

Thought Leaders

A CTO's Response to Trump's Cybersecurity Executive Order

Jeff Williams, Co-Founder, Chief Technology Officer | May 12, 2017

In principle, holding each agency head accountable for his or her agency’s cybersecurity is logical. The problem with that is they were already accountable. When the OPM was breached, director Katherine Archuleta stepped down. And there were calls..

Read More

Thought Leaders

Improve Application Security by Turning it into Code

Jeff Williams, Co-Founder, Chief Technology Officer | May 11, 2017

Why is application security such a pain? One of the hard problems with application security is that there are a zillion different ways that things can go wrong.

Read More

Thought Leaders

We are Seeing Ongoing Struts 2 Attacks

Jeff Williams, Co-Founder, Chief Technology Officer | April 10, 2017

If you’re running web applications on the Internet, then you’re almost certainly seeing probes for the Struts 2 vulnerability (CVE-2017-5638). These attacks started within hours of the vulnerability being released, and we continue to see..

Read More

Application Security- Thought Leaders

Two New Vulnerabilities added to the OWASP Top 10

Jeff Williams, Co-Founder, Chief Technology Officer | April 10, 2017

The Open Web Application Security Project (OWASP) just released an update to the ten most critical web application security risks.

Back in 2002 I wrote the first OWASP Top 10 list and it was published in 2003. My idea was that application security..

Read More

Thought Leaders

How Can CISOs Create A Balanced Portfolio Of Cybersecurity Products?

Mark Hodgson, Vice President of Marketing | March 28, 2017

We’re entering a world of deepening complexity when it comes to security for the modern enterprise. With companies integrating legacy data centers, manufacturing facilities, and networks with the cloud and the Internet of Things (IoT), all..

Read More

Contrast News- Thought Leaders

US Needs a Federal CISO — A Response to the Appointment of a US Cybersecurity Coordinator

Jeff Williams, Co-Founder, Chief Technology Officer | March 28, 2017

In response to the Trump administration announcement of the appointment of a White House cybersecurity coordinator. Contrast Security Co-founder and CTO, Jeff Williams, was ask to provide his thoughts in a recently published CSO article, "US Needs a..

Read More

Application Security- Thought Leaders

What is OWASP, and Why it Matters for AppSec

Christine Carrig, Director of Marketing | February 23, 2017

Vulnerability research conducted by Contrast Labs was referenced in an article "What is OWASP and Why it Matters for AppSec." The Network World article, written by Michelle Drolet, discusses OWASP and why it proves the need for modern,..

Read More

Contrast News- Thought Leaders

Cybersecurity Execs Voice Concern over Trump Travel Ban

Christine Carrig, Director of Marketing | January 31, 2017

Last Friday President Trump signed executive orders that banned nationals of seven countries that included all people hailing from: Iraq, Syria, Iran, Libya, Somalia, Sudan and Yemen. The executive order also bans entry of those fleeing from..

Read More

Contrast News- Thought Leaders

DevOps Security: Turn Security into Code [RSA Preview]

Mark Hodgson, Vice President of Marketing | January 31, 2017

The San Francisco edition of the annual RSA security conference is just around the corner. DevOps security is a hot topic right now, and the RSA schedule includes a day-long seminar dubbed "DevOps Connect: DevSecOps Edition."

The list of security..

Read More

Application Security- Thought Leaders

Ditch Your Web Application Firewall (WAF) — 3 Reasons Why

Christine Carrig, Director of Marketing | January 27, 2017

It is time… time to ditch traditional approaches to the way we have managed application security. Specifically, it’s time to ditch your Web Application Firewalls (WAFs). Ten to fifteen years ago, WAFs were revolutionizing the way we thought of..

Read More

SIGN UP FOR BLOG UPDATES

"When we instrumented applications at the UK's largest Government Department with Contrast Assess, it was like handing our project teams an incredibly powerful debugging agent containing the sum total of application security knowledge.” 

Declan O'Riordan
Security Testing Manager
Testing IT, Ltd.
continuous-application-security
Laptop-Blue-Bg.jpg

schedule a demo now

Discover how easy it is to spot & stop attacks in real-time.
Laptop.png
Get Demo