Contrast Security

Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • Struts 2, Equifax and You
    It's hard to overstate what's happening here. The FBI, New York and Massachusetts Attorneys General, and Congress are now running inquiries into the Equifax breach. More will come. It's clear that the U.S. economy will change in some way as a result of this Struts 2 vulnerability. It may be macabre and indulgent, but you can’t help but to speculate on the consequences:
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • VULNERABILITY ALERT: CVE-2017-9805 – Struts S2-052 Exploit Released, Protection Offered
    On Tuesday, September 5, 2017, a critical new Remote Code Execution (RCE) vulnerability was disclosed against all previous versions of the Apache Struts 2 REST Plugin [1] available in those packages with Struts 2 between 2.0.0 and 2.5.12 (inclusive). The library uses XStream to deserialize HTTP input without any type enforcement, allowing attackers to specify unexpected types and cause...
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • Thoughts on Modern Security Practices and Security Frameworks
    How have modern assets like cloud instances, web-based applications, mobile devices, application containers, and others affected your security and risk management program? It's way past time for organizations to realize how ridiculous it is to not expect web applications and APIs to be attacked. There is no perimeter, and there are no "internal" applications. Application security isn'...
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • Contrast Security Recognized on 2017 Emerging Vendors List
    I'm thrilled to announce that CRN®, a brand of The Channel Company, has named Contrast Security, the first company to enable self-protecting software, to its 2017 Emerging Vendors list in the Security category. This list recognizes recently founded, up-and-coming technology suppliers that are shaping the future of the IT channel through unique technological innovations.
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • Self-Protecting Software Key Part of EY’s New $10M Security Bet
    I’m delighted to announce that Contrast Security has been identified as a key technology and alliance partner for Ernst & Young’s (EY) recently announced Advanced Cybersecurity Center, based in Dallas, Texas. This is an important milestone in the software security industry as global consulting firms invest more in Application Security, addressing the #1 source of data breaches for organizations ar...
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • NEW REPORT: Just 7% of Application Vulnerabilities are Sourced from 3rd-Party Code Libraries
    If you haven’t heard by now, Contrast has a brand spanking new report available… and lots of folks are talking about it. The report is entitled: State of Application Security: Libraries & Software Composition Analysis and highlights analytics gathered from within 1,857 applications, which included different open source libraries, frameworks, and modules. This latest Contrast Labs repor...
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • PRESS RELEASE: Software Libraries Represent Just Seven percent of Application Vulnerabilities
    Los Altos, Calif. – July 24, 2017 – Contrast Labs, the research arm of Contrast Security, the first company to enable self-protecting software, today announced its State of Application Security: Libraries & Software Composition Analysis Report. The data reveals that although third-party software libraries represent a majority (79 percent) of an application’s code, they account for less than seven ...
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • The Case for Application Security Monitoring
    Monitoring the Security of a Running Application has Been a Guessing Game Until recently, we knew little to nothing about the security state inside a running application – unless developers built in custom logging. Without security visibility, security pros would typically:
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • How Code Vulnerabilities Can Lead to Bad Accidents
    Are you interested in the security of the open source libraries you're trusting with your business? If so, you may want to read this article, "How Code Vulnerabilities Can Lead to Bad Accidents" that was featured in Dark Reading. It discusses how the broken software supply chain leaves organizations open to hackers and why organizations need to know whether their applications are built using trust...
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • With DevOps Security Must Work Differently
    Application security gets harder every day. Every line of code written opens organizations to new vulnerabilities and breaches. Contrast is committed to supporting companies using Agile and DevOps by focusing product enhancements on integration and features that support digital transformation initiatives. Contrast enables DevOps teams to deliver continuous security by empowering develo...
Contrast Security
Contrast Security
Blog Post
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • Contrast Brings Security into the DevOps Era
      Latest Product Enhancements and Integrations Support Companies using Agile and DevOps to Deliver on Digital Transformation Initiatives Los Altos, Calif. – June 20, 2017 – Contrast Security, the first company to enable self-protecting software, today announced key integrations and product enhancements to address the urgent security needs of organizations pursuing DevOps. These include: Jenkins...
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • Are You Ready to Automate Security Testing? Meet DevSecOps.
    It is no secret that software applications today are complex and can potentially be riddled with many different security issues. From bad code to misconfigured servers and everything in between, solving this problem requires security implications to always be top of mind no matter stage of the application you are working on.
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • Join Us for Cocktails During the Velocity Conference on June 21st
    We're looking forward to meeting you at the upcoming Velocity Conference in San Jose, June, 21 – 22. Please make time to meet us at our Booth or join us for Happy Hour on Wednesday, June 21st. Join us for Happy Hour on June 21st at 6:30 PMStretch your legs with a short walk to Scott's Seafood – just a block from the San Jose Convention Center. On Wednesda...
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • How Contrast Protect Out-Firewalls Web Application Firewalls (WAFs)
    Contrast Protect helps to secure software applications in a radically better way than legacy tools like web application firewalls (WAFs). Contrast operates from within your application, moving and scaling with the app, providing accurate attack visibility, monitoring and protection because it is fully aware of the running application.
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • Insights from Microsoft Build Conference 2017
    At Microsoft Build in Seattle earlier this month, Microsoft presented its strategy and demonstrated its commitment to help move enterprises into the digital era. This transformation will require businesses to embrace technologies like cloud, microservices, and artificial intelligence (AI). Microsoft’s leadership has shifted the company’s focus from leveraging Windows as its showpiece, to helping o...
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • CAS: The Best Way to Modernize Application Security
    In case you don't recognize the acronym, "CAS" stands for Continuous Application Security. It may not become a household name, but here at Contrast we believe it will be as common as "WAFs" within our industry.  CAS will help lead the way to integrating modern DevOps methodologies for software development. CAS is an approach, long advocated by the founders of Contrast Security, to "se...
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • A CTO's Response to Trump's Cybersecurity Executive Order
    In principle, holding each agency head accountable for his or her agency’s cybersecurity is logical. The problem with that is they were already accountable. When the OPM was breached, director Katherine Archuleta stepped down. And there were calls for the director of the IRS to resign after its breach last year. Simply forcing agency heads to resign without providing the funds and support they nee...
Contrast Security
Contrast Security
Blog Post
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • Google Docs May Still be Vulnerable to Phishing Attacks
    On Tuesday, users of Google Docs were targeted with an email phishing attack. The email content was a ruse to trick folks into granting access to their contact data. Google quickly put measures into place to stop the attack. Please visit this Google page to learn how to protect yourself >>
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • The DevOps-Ready Security Program
    6 Tips to Bring Security into the DevOps Era Extending DevOps to your software application security team shifts security from being a bottleneck to an enabler. According to McKinsey & Company, the benefits of being a DevOps-ready IT organization include: An increase of 25-30% in capacity creation (i.e., freeing up people and resources to work on other priorities) A 50-75% reduct...
Contrast Security
Contrast Security
Blog Post

New blog articles detected.

  • How AppSec Fits into the World of DevOps and Containers
    Business undertaking digital transformation initiatives are turning to Agile development and DevOps workflows to execute their software projects. Agile lets software teams respond quickly to customer needs, and DevOps helps organizations deploy applications continuously so customers can see and use the software, and provide feedback on how well it meets their requirements. Agile and De...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.