Skip to content

Live Weekly Demos

Join our weekly demo where product experts showcase key Contrast Platform features and answer questions live from the audience.

March 29, 2023 | 9am PDT / 12pm EDT

Mastering Kafka Security: Uncover Hidden Vulnerabilities with Contrast Assess

If you're using a message queue in your app, you probably know that it's a critical piece of infrastructure—but what if someone used it to attack your application? That's where Contrast Assess comes in.

REGISTER NOW

Past Demos

Blog_05202021_President Biden’s Executive Order Secure the Software Supply Chain-1

How to Secure your TypeScript and JavaScript Framework Source Code

November 30th

cs-blog

Protect your Applications from Message Queue Vulnerabilities

November 9th

Blog_07122021_How To Secure Your Application Inside Azure Kubernetes Service in 10 Minutes

Kubernetes Operators - Scale application security at lightning speeds using Kubernetes Operators

November 2nd

Zero Day

Next zero-day vulnerability is here – but don’t despair! Learn what it is and how to mitigate it.

October 26th

Blog_06252021_MORE JAVA ATTACKS HIT EXISTING VULNERABILITIES IN MARCH–APRIL

Embed open-source security on every pull request with the new GitHub Action for Contrast SCA

October 19th

Blog_09012021_Modern Problems Traditional Security Scanning Wasn’t Built for Today’s Pipelines

Testing Client-Side Javascript with Contrast Scan

October 12th

Blog_07072021_Real-time Remediation Support Helps Developers Write Better Code

Secure Code on Every Commit for Free with CodeSec + GitHooks

October 5th

Blog_02102021_AS 2020 CLOSED OUT, MORE APPLICATIONS HAD SERIOUS VULNERABILITIES AND ATTACK LIKELIHOOD REMAINED ELEVATED

Learn why DAST doesn't stack up when it comes to security

Blog_WAF, RASP and Log4Shell_12142021

Detect Malware in your Cloud-Native Applications

cs-blog-031622

SAST vs. IAST: Picking the Right Tool for the Job

Blog_11092021_Automating .Net 6 Application Protection

Map your Attack Surface with Route Intelligence

Blog_09012021_Modern Problems Traditional Security Scanning Wasn’t Built for Today’s Pipelines

Securing the APIs that Matter

Blog_02102021_AS 2020 CLOSED OUT, MORE APPLICATIONS HAD SERIOUS VULNERABILITIES AND ATTACK LIKELIHOOD REMAINED ELEVATED

Managing Open Source Risk in Your CI/CD Pipeline

Blog_0-Day Detection of Log4j2 vulnerability_12102021

How to Spot and Stop a Zero-Day Exploit

Blog_GitHubActions Blog Series, Part 2- Deploying with Amazon EKS_02102022

Secure your GitHub Pipeline with Contrast’s GitHub Actions for Free

Blog_10192021_Contrast Delivers Developer-friendly Security for Serverless Applications

Securing Modern Serverless App Development

rsa-bg

Key Takeaways from RSA Conference 2022

cs-blog-hack-2501x1309-061622

Keeping Node Applications Secure

cs-zero-day-blog-060322

CodeSec by Contrast

Blog_05042021_A Single Security Platform That Actualizes DevSecOps

The Contrast Platform

Contrast Scan-1

Showcasing Pipeline-Native Integrations with Contrast Scan

Blog_02032021_How Contrast Simplified and Streamlined Its New Hire Onboarding Process

Using Developer Tools to Secure Software

php

PHP for Assess and SCA

Blog-08042021_CONTRAST APPLICATION SECURITY PLATFORM CUTS VULNERABILITY ESCAPE RATE (VER) FROM 12 TO 1 IN A YEAR

Contrast Platform

Blog_02102021_AS 2020 CLOSED OUT, MORE APPLICATIONS HAD SERIOUS VULNERABILITIES AND ATTACK LIKELIHOOD REMAINED ELEVATED

Contrast SCA

Blog_09132021_Bounty Hunters Wanted- The Contrast Security Bug Bounty Program

Contrast Scan

Contrast Protect

Blog_10192021_Contrast Delivers Developer-friendly Security for Serverless Applications

The Contrast Serverless Application