Contrast Security
Contrast Security
SlideShare Presentation
  • In this episode, Jeff Williams interviews Wayne Jackson of Sonatype. They discuss the results from The 2014 Open Source Development Survey, where 3,300 surveyed developers gave their honest opinions on everything from third-party code to internal policies and procedures. Topics included the implications on continuous application security, compliance measures, and application security automation.

Contrast Security
Contrast Security
SlideShare Presentation
  • Welcome to The Security Influencer's Channel. In this episode, Jeff Williams interviews Andrew Hay of Open DNS. They discuss bad credential management and the recent eBay breach, thinking with the mind of an attacker, firewalls, security in the cloud, and fast-moving agile and DevOps life cycles in the software development life cycle (SDLC).

Contrast Security
Contrast Security
SlideShare Presentation
  • In this episode, Jeff Williams interviews Bruce Brody of Cubic Solutions, a leading provider of specialized systems and services in the rapidly changing world of technology. They examine the relationship between federal cybersecurity rules and regulations, and how workforces can stay on top of educating their employees regarding the changing threatscape.

Contrast Security
Contrast Security
SlideShare Presentation
  • In this episode, Jeff Williams interviews Wayne Jackson of Sonatype. They discuss the results from The 2014 Open Source Development Survey, where 3,300 surveyed developers gave their honest opinions on everything from third-party code to internal policies and procedures. Topics included the implications on continuous application security, compliance measures, and application security automation.

Contrast Security
Contrast Security
SlideShare Presentation
  • Welcome to The Security Influencer's Channel. We're glad you're here. From time to time we interview experts in information security, application security, and network security. We talk about current issues, focusing on what is working and what is not. In this episode, Jeff Williams interviews Jonathan Chow and Neeta Maniar of Live Nation Entertainment: The world's leading producer and promoter ...

Contrast Security
Contrast Security
SlideShare Presentation
  • Welcome to The Security Influencer's Channel. In this episode, Jeff Williams interviews Andrew Hay of Open DNS. They discuss bad credential management and the recent eBay breach, thinking with the mind of an attacker, firewalls, security in the cloud, and fast-moving agile and DevOps life cycles in the software development life cycle (SDLC).

Contrast Security
Contrast Security
SlideShare Presentation
  • In this episode, Jeff Williams interviews Bruce Brody of Cubic Solutions, a leading provider of specialized systems and services in the rapidly changing world of technology. They examine the relationship between federal cybersecurity rules and regulations, and how workforces can stay on top of educating their employees regarding the changing threatscape.

Contrast Security
Contrast Security
SlideShare Presentation
  • Welcome to The Security Influencer's Channel. We're glad you're here. From time to time we interview experts in information security, application security, and network security. We talk about current issues, focusing on what is working and what is not. In this episode, Jeff Williams interviews Jonathan Chow and Neeta Maniar of Live Nation Entertainment: The world's leading producer and promoter ...

Contrast Security
Contrast Security
Blog Post
  •  We were thrilled to participate at this year’s RSA Conference in San Francisco that ended a few weeks ago. It’s a suitable time to reflect on the major theme of the show and highlight the success of our inaugural Contrast User Group meeting. Additionally, its fitting to underscore what an exciting year it’s already been for our company and our customers, and everyone is confident we can mainta...

Contrast Security
Contrast Security
Blog Post
  • Contrast Security was named the winner of a Silver Stevie® Award in the Most Innovative Tech Company of the Year – Up to 100 Employees category and Contrast Assess was honored with a Bronze Stevie® Award in the New Product or Service of the Year – Software – DevOps Solution category in The 16th Annual American Business Awards® today.

Contrast Security
Contrast Security
Blog Post
  • New vice president of customer success strengthens the company’s commitment to long-term investment in customers Los Altos, Calif. – April 24, 2018 – Contrast Security, the pioneer in enabling “self-protecting” software with security safeguards built directly into critical applications, today announced the appointment of Scott Chaykin to vice president of customer success. The new addition streng...

Contrast Security
Contrast Security
Blog Post
  • Gartner recently released its periodic update to the Magic Quadrant for Application Security Testing (AST) for 2018. Gartner defines the AST market as the buyers and sellers of products and services designed to analyze and test applications for security vulnerabilities. The report provides extensive research and analysis on 12 major vendors within Application Security Testing. Vendors are evaluate...

Contrast Security
Contrast Security
Blog Post
  • Contrast Labs' analysis of real world application security data from March 2018. We're going to change it up a bit this month by expanding our coverage to include: Both known and unknown vulnerabilities in custom code Both known and unknown vulnerabilities in libraries and frameworks Attacks on applications and APIs To learn more about how Contrast directly measures both vulnerabiliti...

Contrast Security
Contrast Security
Blog Post
  • We are delighted to announce that this week at RSA, Contrast Security was recognized as a leader in Web Application Security by Cyber Defense Magazine’s (CDM) 2018 InfoSec Awards. Each year, CDM’s InfoSec Awards honors the hottest, market leading InfoSec companies that are offering incredible products and services. After reviewing nearly 3,000 entrants, Contrast Security was selected as one of...

Contrast Security
Contrast Security
Blog Post
  • We were delighted to see this write up in CSO. Below, you'll find a review from John Breeden II about Contrast Security. Feel free to snag the original PDF (download below) and share with your colleagues. We think it captures the essence of what Contrast can do. Please enjoy the read! "Contrast Security has one of the most elegant solutions out there for application security. We can see why i...

Contrast Security
Contrast Security
Blog Post
Contrast Security
Contrast Security
Blog Post
  • Contrast Labs' analysis of real world application attack data from February 2018. Overview In February, overall application attack volume more than doubled. Once again this month there were no applications or APIs that were not attacked. The majority of the attack traffic originiated in the United States. This month saw continued dominance of injection attacks of all types (XSS, SQL, CMD...

Contrast Security
Contrast Security
Blog Post
  • Contrast Labs' analysis of real world application attack data from January 2018. Overview In January, overall application attack volume just about doubled. Once again this month there were no applications or APIs that were not attacked. Once again, the United States dominated the attack landscape, with almost 2x the rest of the world combined. Also, while there was modest growth in attacks ...

Contrast Security
Contrast Security
Blog Post
  • Contrast Labs' analysis of real world application attack data from January 2018. Overview In January, overall application attack volume just about doubled. Once again this month there were no applications or APIs that were not attacked. Once again, the United States dominated the attack landscape, with almost 2x the rest of the world combined. Also, while there was modest growth in attacks ...

Contrast Security
Contrast Security
Blog Post
  • WAF + ASM: Full Protection for Your Running Application Contrast built and marketed Contrast Protect as a “WAF killer;” a better, more accurate and scalable way to protect your web applications in production. However, our customers told us something completely different. Specifically, they told us the following: They think their WAF is a worthwhile investment and don’t plan to get rid of it ...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.