Application Security

Application Security

AI Governance in AppSec: The More Things Change, The More They Stay the Same

Learn how AppSec teams can extend existing security and compliance practices seamlessly to AI ...
Cybersecurity Insights with Contrast CISO David Lindner | 03/07/25

Cybersecurity Insights with Contrast CISO David Lindner | 03/07/25

Insight No. 1. — Ransomware groups are using CISA’s KEV catalog as a runbook  Given that CISA's Known Exploited Vulnerabilities (KEV) catalog highlights the most actively exploited and critical Common Vulnerabilities and ...
Escape + Wiz: Unified Security for Modern, Cloud-Native Applications

Escape + Wiz: Unified Security for Modern, Cloud-Native Applications

A new technology partnership enables mutual customers to gain full cloud and application context, establish clear ownership, and accelerate the remediation of critical risks ...
Getting the Most Value Out of the OSCP: The PEN-200 Course

Getting the Most Value Out of the OSCP: The PEN-200 Course

In this second post of a five-part series, I provide advice on how to best utilize the PEN-200 course material for a successful career in ethical hacking.Disclaimer:All opinions expressed in this article are ...

Introducing Mend AI Premium

Robust AI governance and threat detection with Mend AI Premium ...
Enhancing Application Security | Contrast ADR and Splunk | Contrast Security

Enhancing Application Security | Contrast ADR and Splunk | Contrast Security

Have you silenced WAF alerts in your SIEM or just stopped sending them altogether? You're not alone. Many SOCs find themselves overwhelmed by the sheer volume of noise generated by traditional WAFs, ...
When Your SaaS Vendor Goes Dark: A Guide to Protecting Your Business

When Your SaaS Vendor Goes Dark: A Guide to Protecting Your Business

When a SaaS vendor unexpectedly shuts down, your business faces significant risks. This comprehensive guide provides actionable strategies to recover your data, find alternative solutions, and implement preventative measures to ensure business ...
Image 1

How Scalping Bots Exploited a Vulnerable API to Disrupt Online Retail Sales

In the fast-paced world of online retail, where customer satisfaction and availability are paramount, a sudden attack by scalping bots can disrupt operations, inflate costs, and damage reputation. A North American Online ...
Most security tools are expensive paperweights: how to get your money's worth | Jeevan Singh

How to build a strong business case for replacing legacy DAST with a modern solution —a practical guide

Learn how to build a strong business case for replacing legacy DAST with a modern solution. This step-by-step guide helps AppSec leaders ...