Contrast Security

Contrast Security
Contrast Security
Blog Post
  • New product capabilities to enable integration with AWS Elastic Beanstalk, Amazon EC2 and Amazon RDS Los Altos, Calif. — Nov. 15, 2017 — Contrast Security, a pioneer in enabling “self-protecting” software with security safeguards built directly into critical applications, today announced integrations to deploy applications securely on AWS Elastic Beanstalk, Amazon Elastic Compute Cloud (Amazon EC...

Contrast Security
Contrast Security
Blog Post
  • Ed Amoroso, former CISO of AT&T, and Founder and CEO of TAG Cyber, sat down for a conversation with Contrast Security CEO Alan Naumann, and CTO and Co-founder Jeff Williams. In these two, ten-minute interviews, Ed digs into the minds of these "security influencers." You'll get their take on what works (and doesn't) in software security. They cover topics such as how to improve DevOp...

Contrast Security
Contrast Security
Blog Post
  • Round led by Battery Ventures validates “self-protecting” software and sets standard for application security; Equifax breach shows criticality of sector Los Altos, Calif. — October 19, 2017 — Contrast Security, the pioneer in enabling “self-protecting” software with security safeguards built directly into critical applications, today announced it has completed a $30 million Series C financing ro...

Contrast Security
Contrast Security
Blog Post
  • More than ever before, the security of a running application is a shared responsibility: The security team needs to detect, monitor and respond to an application layer breach The operations team needs to ensure performance, stability & reliability of the application in the event of a breach The engineering team needs to know what security defects to fix and what libraries & components are ...

Contrast Security
Contrast Security
Blog Post
  • As we mentioned last week, Equifax continues to make headlines and ramifications of building sites with insecure code is taking a its toll. Below you'll read a series of startling comments that appeared this past week by Jeff Williams, Contrast Security Co-Founder and CTO. According to Jeff, the source of the attack was a 3rd-party library called Fireclick, which accesses yet another site, netflam...

Contrast Security
Contrast Security
Blog Post
  • Yes, we have all seen the headlines.  But, don’t think that the issues that arose from the Equifax breach and the Struts 2 vulnerability will disappear any time soon. Last time I checked, we seen 34 articles published that Contrast was either quoted or referenced. Below are just a few article links pertaining to the event that include insights from one of Contrast Security’s cyber secu...

Contrast Security
Contrast Security
Blog Post
  • Leader in Security Software Enables Continuous Security for Cloud Applications Los Altos, Calif. — Sept. 26, 2017 — Contrast Security, the first company to enable self-protecting software, today announced it has developed cloud-ready integrations with IBM Cloud, Microsoft Visual Studio Team Services, Pivotal Cloud Foundry®, and two-way integrations with Jira. These new features and al...

Contrast Security
Contrast Security
Blog Post
  • It's hard to overstate what's happening here. The FBI, New York and Massachusetts Attorneys General, and Congress are now running inquiries into the Equifax breach. More will come. It's clear that the U.S. economy will change in some way as a result of this Struts 2 vulnerability. It may be macabre and indulgent, but you can’t help but to speculate on the consequences:

Contrast Security
Contrast Security
Blog Post
  • Wow, what a week! Our industry is rippling from all the news surrounding the latest Struts 2 vulnerability and the possibility that another Struts vulnerability was also responsible for the Equifax hack. 

Contrast Security
Contrast Security
Blog Post
  • On Tuesday, September 5, 2017, a critical new Remote Code Execution (RCE) vulnerability was disclosed against all previous versions of the Apache Struts 2 REST Plugin [1] available in those packages with Struts 2 between 2.0.0 and 2.5.12 (inclusive). The library uses XStream to deserialize HTTP input without any type enforcement, allowing attackers to specify unexpected types and cause...

Contrast Security
Contrast Security
Blog Post
  • How have modern assets like cloud instances, web-based applications, mobile devices, application containers, and others affected your security and risk management program? It's way past time for organizations to realize how ridiculous it is to not expect web applications and APIs to be attacked. There is no perimeter, and there are no "internal" applications. Application security isn'...

Contrast Security
Contrast Security
Blog Post
Contrast Security
Contrast Security
Blog Post
  • I'm thrilled to announce that CRN®, a brand of The Channel Company, has named Contrast Security, the first company to enable self-protecting software, to its 2017 Emerging Vendors list in the Security category. This list recognizes recently founded, up-and-coming technology suppliers that are shaping the future of the IT channel through unique technological innovations.

Contrast Security
Contrast Security
Blog Post
  • I’m delighted to announce that Contrast Security has been identified as a key technology and alliance partner for Ernst & Young’s (EY) recently announced Advanced Cybersecurity Center, based in Dallas, Texas. This is an important milestone in the software security industry as global consulting firms invest more in Application Security, addressing the #1 source of data breaches for organizations ar...

Contrast Security
Contrast Security
Blog Post
  • Contrast Security has introduced a new report series, “State of Application Security,” based on research efforts by Contrast Labs. The data for these studies was gathered directly and continuously from within running applications and APIs using Contrast’s security analysis and protection platform. We’re excited to kick off the series with this Summer 2017’s State of Application Security: Libraries...

Contrast Security
Contrast Security
Blog Post
  • If you haven’t heard by now, Contrast has a brand spanking new report available… and lots of folks are talking about it. The report is entitled: State of Application Security: Libraries & Software Composition Analysis and highlights analytics gathered from within 1,857 applications, which included different open source libraries, frameworks, and modules. This latest Contrast Labs repor...

Contrast Security
Contrast Security
Blog Post
  • Los Altos, Calif. – July 24, 2017 – Contrast Labs, the research arm of Contrast Security, the first company to enable self-protecting software, today announced its State of Application Security: Libraries & Software Composition Analysis Report. The data reveals that although third-party software libraries represent a majority (79 percent) of an application’s code, they account for less than seven ...

Contrast Security
Contrast Security
Blog Post
  • Monitoring the Security of a Running Application has Been a Guessing Game Until recently, we knew little to nothing about the security state inside a running application – unless developers built in custom logging. Without security visibility, security pros would typically:

Contrast Security
Contrast Security
Blog Post
  • Are you interested in the security of the open source libraries you're trusting with your business? If so, you may want to read this article, "How Code Vulnerabilities Can Lead to Bad Accidents" that was featured in Dark Reading. It discusses how the broken software supply chain leaves organizations open to hackers and why organizations need to know whether their applications are built using trust...

Contrast Security
Contrast Security
Blog Post
  • Application security gets harder every day. Every line of code written opens organizations to new vulnerabilities and breaches. Contrast is committed to supporting companies using Agile and DevOps by focusing product enhancements on integration and features that support digital transformation initiatives. Contrast enables DevOps teams to deliver continuous security by empowering develo...

Contrast Security
Contrast Security
Blog Post
  •   Latest Product Enhancements and Integrations Support Companies using Agile and DevOps to Deliver on Digital Transformation Initiatives Los Altos, Calif. – June 20, 2017 – Contrast Security, the first company to enable self-protecting software, today announced key integrations and product enhancements to address the urgent security needs of organizations pursuing DevOps. These include: Jenkins...

Contrast Security
Contrast Security
Blog Post
  • It is no secret that software applications today are complex and can potentially be riddled with many different security issues. From bad code to misconfigured servers and everything in between, solving this problem requires security implications to always be top of mind no matter stage of the application you are working on.

Contrast Security
Contrast Security
Blog Post
  • More and more companies interact with customers via digital channels, making the digital customer experience they provide a critical component of business success1. A crashed or poorly performing application will negatively impact customer confidence and drive up customer churn. Software has to be resilient to a broad range of potential disruptions to avoid these scenarios.

Contrast Security
Contrast Security
Blog Post
  • We're looking forward to meeting you at the upcoming Velocity Conference in San Jose, June, 21 – 22. Please make time to meet us at our Booth or join us for Happy Hour on Wednesday, June 21st. Join us for Happy Hour on June 21st at 6:30 PMStretch your legs with a short walk to Scott's Seafood – just a block from the San Jose Convention Center. On Wednesda...

Contrast Security
Contrast Security
Blog Post
  • Contrast Protect helps to secure software applications in a radically better way than legacy tools like web application firewalls (WAFs). Contrast operates from within your application, moving and scaling with the app, providing accurate attack visibility, monitoring and protection because it is fully aware of the running application.

Contrast Security
Contrast Security
Blog Post
  • At Microsoft Build in Seattle earlier this month, Microsoft presented its strategy and demonstrated its commitment to help move enterprises into the digital era. This transformation will require businesses to embrace technologies like cloud, microservices, and artificial intelligence (AI). Microsoft’s leadership has shifted the company’s focus from leveraging Windows as its showpiece, to helping o...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.