Skip to content

Live Weekly Demos

Join our weekly demo where product experts showcase key Contrast Platform features and answer questions live from the audience.

December 7, 2022 | 9am PDT / 12pm EDT

Quick Takeaways from AWS re:Invent 2022

Join us in an engaging conversation as we cover a recap of all things thrilling at the event. We'll discuss major trends observed and highlight a few of the newest technologies. We'll bring to the surface some of the most interesting conversations we had on the booth floor, as well as what it feels like to be at the event when things are anything but normal

REGISTER NOW

Past Demos

Blog_05202021_President Biden’s Executive Order Secure the Software Supply Chain-1

How to Secure your TypeScript and JavaScript Framework Source Code

November 30th

cs-blog

Protect your Applications from Message Queue Vulnerabilities

November 9th

Blog_07122021_How To Secure Your Application Inside Azure Kubernetes Service in 10 Minutes

Kubernetes Operators - Scale application security at lightning speeds using Kubernetes Operators

November 2nd

Zero Day

Next zero-day vulnerability is here – but don’t despair! Learn what it is and how to mitigate it.

October 26th

Blog_06252021_MORE JAVA ATTACKS HIT EXISTING VULNERABILITIES IN MARCH–APRIL

Embed open-source security on every pull request with the new GitHub Action for Contrast SCA

October 19th

Blog_09012021_Modern Problems Traditional Security Scanning Wasn’t Built for Today’s Pipelines

Testing Client-Side Javascript with Contrast Scan

October 12th

Blog_07072021_Real-time Remediation Support Helps Developers Write Better Code

Secure Code on Every Commit for Free with CodeSec + GitHooks

October 5th

Blog_02102021_AS 2020 CLOSED OUT, MORE APPLICATIONS HAD SERIOUS VULNERABILITIES AND ATTACK LIKELIHOOD REMAINED ELEVATED

Learn why DAST doesn't stack up when it comes to security

Blog_WAF, RASP and Log4Shell_12142021

Detect Malware in your Cloud-Native Applications

cs-blog-031622

SAST vs. IAST: Picking the Right Tool for the Job

Blog_11092021_Automating .Net 6 Application Protection

Map your Attack Surface with Route Intelligence

Blog_09012021_Modern Problems Traditional Security Scanning Wasn’t Built for Today’s Pipelines

Securing the APIs that Matter

Blog_02102021_AS 2020 CLOSED OUT, MORE APPLICATIONS HAD SERIOUS VULNERABILITIES AND ATTACK LIKELIHOOD REMAINED ELEVATED

Managing Open Source Risk in Your CI/CD Pipeline

Blog_0-Day Detection of Log4j2 vulnerability_12102021

How to Spot and Stop a Zero-Day Exploit

Blog_GitHubActions Blog Series, Part 2- Deploying with Amazon EKS_02102022

Secure your GitHub Pipeline with Contrast’s GitHub Actions for Free

Blog_10192021_Contrast Delivers Developer-friendly Security for Serverless Applications

Securing Modern Serverless App Development

rsa-bg

Key Takeaways from RSA Conference 2022

cs-blog-hack-2501x1309-061622

Keeping Node Applications Secure

cs-zero-day-blog-060322

CodeSec by Contrast

Blog_05042021_A Single Security Platform That Actualizes DevSecOps

The Contrast Platform

Contrast Scan-1

Showcasing Pipeline-Native Integrations with Contrast Scan

Blog_02032021_How Contrast Simplified and Streamlined Its New Hire Onboarding Process

Using Developer Tools to Secure Software

php

PHP for Assess and SCA

Blog-08042021_CONTRAST APPLICATION SECURITY PLATFORM CUTS VULNERABILITY ESCAPE RATE (VER) FROM 12 TO 1 IN A YEAR

Contrast Platform

Blog_02102021_AS 2020 CLOSED OUT, MORE APPLICATIONS HAD SERIOUS VULNERABILITIES AND ATTACK LIKELIHOOD REMAINED ELEVATED

Contrast SCA

Blog_09132021_Bounty Hunters Wanted- The Contrast Security Bug Bounty Program

Contrast Scan

Contrast Protect

Blog_10192021_Contrast Delivers Developer-friendly Security for Serverless Applications

The Contrast Serverless Application