Revolutionizing DAST with IAST: A new era in application security
WHITE PAPER:
This white paper explores how Interactive Application Security Testing (IAST) transforms Dynamic Application Security Testing (DAST). It highlights IAST's ability to analyze applications internally, offering deeper insights and reducing false positives. Discover how IAST enhances security testing accuracy and efficiency.
Posted: 03 Mar 2025 | Published: 04 Mar 2025
|
|
Revolutionizing DAST with IAST: A new era in application security
WHITE PAPER:
This white paper explores how Interactive Application Security Testing (IAST) enhances Dynamic Application Security Testing (DAST) by providing deeper insights into code vulnerabilities and data flows. It introduces Contrast Security's Runtime Security Platform, improving AppSec testing with real-time monitoring. Learn how IAST surpasses DAST.
Posted: 27 Feb 2025 | Published: 28 Feb 2025
|
|
Understanding the risks of the software supply chain
WHITE PAPER:
The software supply chain is increasingly vulnerable to security risks like malicious code and licensing issues. Learn how to address these challenges and secure your applications by reading this Contrast Security white paper.
Posted: 07 Feb 2025 | Published: 24 Jan 2025
|
|
Understanding Contrast ADR
VIDEO:
In this video, Jeff Williams, Founder and CTO of Contrast Security, chats with Chris Hughes, CEO of cybersecurity consulting firm Aquia and a former Cyber Innovation Fellow (CIF) at the U.S. Cybersecurity and Infrastructure Security Agency (CISA), about Contrast Application Detection and Response (ADR).
Posted: 29 Jan 2025 | Premiered: 30 Jan 2025
|
|
The benefits of Application Detection and Response
VIDEO:
In this video, Naomi Buckwalter, Senior Director of Product Security at Contrast Security, describes the blindspot security teams are grappling with: scant visibility into the application layer. Luckily, this is a blindspot that Contrast ADR eliminates.
Posted: 29 Jan 2025 | Premiered: 29 Jan 2025
|
|
Introducing Contrast ADR
VIDEO:
Contrast ADR monitors, detects and blocks applications attacks before they spill over into the infrastructure. This video demonstrates the safety and power of running Contrast ADR in 'block mode'. Watch a 5-minute demo showcasing how Contrast ADR enables SOC teams to see and stop application and API attacks.
Posted: 24 Jan 2025 | Premiered: 24 Jan 2025
|
|
Experts: Why the Log4Shell Grinch is still hanging around
BLOG:
Three years after its discovery, Log4Shell remains a stark reminder of systemic cybersecurity challenges, highlighting concerns around software supply chains and open-source software. Despite patches and mitigations, this critical vulnerability persists, buried deep within third-party libraries and legacy systems.
Posted: 23 Jan 2025 | Published: 24 Jan 2025
|
|
12 things to know about ADR
BLOG:
Traditional security tools overlook the application layer, where modern threats like zero-days and API vulnerabilities thrive. Application Detection and Response (ADR) bridges this critical gap, offering real-time, in-depth protection. Discover how Contrast ADR protects your applications without slowing innovation.
Posted: 23 Jan 2025 | Published: 24 Jan 2025
|
|
Unpacking the SEC cybersecurity reporting rules: Enhance compliance efforts and reduce risk with ADR
BLOG:
The SEC's new cybersecurity reporting rules demand timely, detailed disclosure of material incidents within four days—a challenging standard that many companies struggle to meet. Read this blog to learn why tools like Application Detection and Response (ADR) are essential for real-time monitoring, rapid response and robust documentation.
Posted: 23 Jan 2025 | Published: 24 Jan 2025
|
|
November: The top attacks ADR caught on the brink of exploit
RESEARCH CONTENT:
Applications and APIs face relentless threats, with an average of 50 confirmed attacks per app slipping past traditional defenses. Discover how Contrast ADR provides real-time application layer visibility to safeguard your systems.
Posted: 23 Jan 2025 | Published: 24 Jan 2025
|
|
Silent but deadly: December sees deserialization attacks surge despite overall lull in app attacks
BLOG:
While December 2024 saw a slight decline in overall application and API attacks, unsafe deserialization attacks surged, averaging 22 attempts per app. Contrast Application Detection and Response (ADR) identified these attacks in real time, filtering out false positives to focus only on genuine attacks.
Posted: 23 Jan 2025 | Published: 24 Jan 2025
|
|
Anatomy of a modern application attack
EBOOK:
This ebook dives into the mechanics of a common application attack, using the infamous Log4Shell vulnerability as an example and demonstrates how application detection and response (ADR) technology — particularly Contrast ADR — effectively safeguards against such threats.
Posted: 23 Jan 2025 | Published: 24 Jan 2025
|
|
How to fix your cybersecurity blindspot
EBOOK:
This eBook explores the growing threat of application and API attacks, focusing on how modern security solutions like Contrast ADR can bridge critical gaps left by traditional security tools. Through real-world case studies and technical insights, it shows how Contrast ADR offers effective detection of zero-day threats within the application layer.
Posted: 23 Jan 2025 | Published: 24 Jan 2025
|
|
Understanding the risks of the software supply chain
WHITE PAPER:
This year alone, successful vulnerability exploits exposed tens of thousands of organizations and applications to malicious activity. Read this white paper to learn how much application code is comprised of open source—and what percentage of that open-source code is ever excised by the application.
Posted: 23 Jan 2025 | Published: 24 Jan 2025
|
|
AppSec noise and fatigue by the numbers
INFOGRAPHIC:
Traditional security tools like SAST and DAST are falling behind in the fight against modern threats—hampered by false positives, slow remediation, and inefficiency. See how Contrast Security's IAST revolutionizes security and accelerates protection.
Posted: 23 Jan 2025 | Published: 24 Jan 2025
|
|
What is a vulnerability?
WEBCAST:
Larry Maccherone, a thought leader on DevSecOps, Agile, and analytics, is unimpressed with the common definition of security vulnerability. In this on-demand webinar, discover the simple change in language that can help AppSec teams more effectively defend against one of bad actors’ favorite methods.
Posted: 06 Jan 2025 | Premiered: Jan 6, 2025
|
|
What is a vulnerability?
WEBCAST:
Larry Maccherone, a thought leader on DevSecOps, Agile, and analytics, is unimpressed with the common definition of security vulnerability. In this on-demand webinar, discover the simple change in language that can help AppSec teams more effectively defend against one of bad actors’ favorite methods.
Posted: 06 Jan 2025 | Premiered: Jan 6, 2025
|
|
The value of Runtime Security for the financial sector: Why current Application Security approaches too often fall flat
WEBCAST:
Financial services face rising cyber threats like island hopping and exploited vulnerabilities. Learn how to safeguard applications with insights from Contrast Security and AWS experts in this informative video.
Posted: 31 Dec 2024 | Premiered: Dec 31, 2024
|
|
The value of Runtime Security for the financial sector: Why current Application Security approaches too often fall flat
WEBCAST:
Watch this webinar to break down the state of application security and threat landscape for financial services companies, alongside experts from Contrast Security and AWS. Don’t risk missing best practices for improving app security and the benefits of implementing runtime security covered.
Posted: 20 Dec 2024 | Premiered: Dec 20, 2024
|
|
Strategic evolution of DevSecOps: Interview with Larry Maccherone at RSA Conference 2024
BLOG:
Runtime security is the future of AppSec, says Larry Maccherone. Learn how the strategic evolution of DevSecOps is shifting testing to production in this interview from RSA 2024. Watch the full video to explore the benefits of this approach.
Posted: 19 Dec 2024 | Published: 19 Dec 2024
|
|
Voice of the Customer for Application Security Testing
GARTNER RESEARCH REPORT:
This Gartner Peer Insights report provides insights on application security testing tools based on user reviews. Explore vendor ratings, willingness to recommend, and segment views to inform your buying decision. Read the full report for a comprehensive voice of the customer perspective.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
Are you ready for DORA?
INFOGRAPHIC:
Prepare your organization for the EU's Digital Operational Resilience Act (DORA) with this checklist to assess your readiness. Learn how Contrast Security can help you secure your applications and take a key step towards DORA compliance. Read the full infographic to get started.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
The limitations of existing Application Security (AppSec) approaches
INFOGRAPHIC:
This infographic explores the limitations of common application security approaches like WAFs and EDR solutions. It highlights their lack of visibility into application-level threats and the need for more robust application security. Read the full infographic to learn how you can better protect your applications.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
Application Security observability
INFOGRAPHIC:
As the network perimeter extends everywhere users are, security must move with it and be in place at the point of access. Download this infographic to learn 16 key things about observability and how it can help secure remote access and build user trust.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
Contrast Security discovers Netflix OSS Genie bug that can lead to RCE during file upload
CASE STUDY:
Vulnerabilities gone undetected are arguably the most dangerous threat to any organization. Contrast Assess aims to be at the forefront of the discovery process, continuously detecting and prioritizing vulnerabilities to guide dev teams on how to eliminate risks. Read this blog for a walkthrough of how they discovered an open-source system bug.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|