Search Results for: security

The Case for Application Detection and Response (ADR)
This white paper explores the need for Application Detection and Response (ADR) to provide continuous protection and real-time visibility into application and API security. Learn how ADR can enhance your organization's security posture and fill the critical gaps left by traditional security measures. Read the full eBook.

Contrast Security

Quickly Scale Anomaly Detection Across Applications Hosted In Your AWS Environment
Securing applications and APIs in the cloud is critical for financial services institutions undergoing digital transformation. Dig into this overview to learn how to extend AWS's security to the application layer.

Contrast Security

AppSec Solution Guide for Complying with New NIST SP 800-53 IAST and RASP Requirements
The new NIST Cybersecurity Framework now requires interactive application security testing (IAST) and runtime application self-protection (RASP) to improve DevSecOps efficiency and reduce security risks. Learn how these technologies can help your organization comply with the latest NIST guidelines in this detailed white paper.

Contrast Security

Cloud Security 101: Best Practices & Self-Assessment
This e-guide walks you through security best practices in the age of cloud. Also inside, put your security knowledge to the test with two cloud security quizzes from our experts.

TechTarget

The Value of Runtime Application with Self-Protection
Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.

Contrast Security

The Devsecops Guide To Managing Open-Source Risk
As open-source software adoption grows, so do associated risks. This e-book examines how to establish visibility, manage policies, automate controls, and prioritize remediations to securely leverage open source without impacting DevOps. Read the full e-book to learn more.

Contrast Security

5 common SD-WAN challenges
SD-WAN is a feature-rich technology with the ability to consolidate networking, security, reporting and management into one platform. But potential users should be aware of inherent SD-WAN challenges and deployment risk factors. In this infographic, we point out five challenges IT teams are facing when evaluating SD-WAN technologies and vendors.

TechTarget ComputerWeekly.com

HOW TO KEEP UP WITH THE RAPIDLY EXPANDING SCOPE OF THE OWASP TOP TEN
The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.

TOPICS: .NET
Contrast Security

Unified Communication: “It should work as easily as a telephone call!”
This article in our Royal Holloway Information Security series explains the security implications of unified communication.

TechTarget ComputerWeekly.com

5 types of data security
Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.

TechTarget ComputerWeekly.com