Application Security
AI Governance in AppSec: The More Things Change, The More They Stay the Same
Learn how AppSec teams can extend existing security and compliance practices seamlessly to AI ...

Cybersecurity Insights with Contrast CISO David Lindner | 03/07/25
David Lindner, Director, Application Security | | codebase, Conditional Access, Cybersecurity, KEV catalog, MFA, open source, patching, Ransomware, security, Vulnerabilities
Insight No. 1. — Ransomware groups are using CISA’s KEV catalog as a runbook Given that CISA's Known Exploited Vulnerabilities (KEV) catalog highlights the most actively exploited and critical Common Vulnerabilities and ...

Apple vs. UK — ADP E2EE Back Door Faceoff
Richi Jennings | | #nobackdoors, ADP, Apple, Apple Data Security, Apple iCloud, back door, backdoor, backdoors, Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, cloud access, Compliance, CSAM, CSEM, E2EE, encryption, end-to-end encryption, five eyes, Five Eyes alliance, Five Eyes Intelligence Alliance, Government & Regulatory News, government access, Investigatory Powers Act, Privacy, SB Blogwatch, uk, UK Investigatory Powers Act, Won’t somebody think of the children?
Won’t Tim Think of the Children? End-to-end encryption battle continues ...
Security Boulevard

Escape + Wiz: Unified Security for Modern, Cloud-Native Applications
A new technology partnership enables mutual customers to gain full cloud and application context, establish clear ownership, and accelerate the remediation of critical risks ...

Getting the Most Value Out of the OSCP: The PEN-200 Course
Kieran Croucher | | Cybersecurity, Cybersecurity Training, Offensive Security, OSCP, Penetration Testing
In this second post of a five-part series, I provide advice on how to best utilize the PEN-200 course material for a successful career in ethical hacking.Disclaimer:All opinions expressed in this article are ...

Enhancing Application Security | Contrast ADR and Splunk | Contrast Security
Contrast Marketing | | Application Detection and Response (ADR), Application Security, AppSec, Contrast ADR, real time, SIEM, SOC, Splunk, threat detection, vulnerability, waf
Have you silenced WAF alerts in your SIEM or just stopped sending them altogether? You're not alone. Many SOCs find themselves overwhelmed by the sheer volume of noise generated by traditional WAFs, ...

When Your SaaS Vendor Goes Dark: A Guide to Protecting Your Business
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Best Practices, data protection, open source, small business, software
When a SaaS vendor unexpectedly shuts down, your business faces significant risks. This comprehensive guide provides actionable strategies to recover your data, find alternative solutions, and implement preventative measures to ensure business ...

How Scalping Bots Exploited a Vulnerable API to Disrupt Online Retail Sales
Grainne McKeever | | advanced bot protection, api, Application Security, bad bots, imperva, thales, web scraping
In the fast-paced world of online retail, where customer satisfaction and availability are paramount, a sudden attack by scalping bots can disrupt operations, inflate costs, and damage reputation. A North American Online ...

How to build a strong business case for replacing legacy DAST with a modern solution —a practical guide
Learn how to build a strong business case for replacing legacy DAST with a modern solution. This step-by-step guide helps AppSec leaders ...