
Cybersecurity Insights with Contrast CISO David Lindner | 05/23/25
Insight No. 1 — Instead of layoffs, bank on your security team. Using Infosec layoffs to chase short-term payroll savings in cybersecurity is a dangerous gamble that will inevitably cost far more in the long run. When security teams are cut, access controls weaken, monitoring capabilities decline, and the organization's ... Read More

Contrast Secures AI Applications and Modern Software | Forrester 2025 SAST Report | Contrast Security
A new report from independent research firm Forrester has several major findings. ... Read More

Application-Layer Visibility and Security | Contrast ADR vs Traditional Tools | Contrast Security
Imagine you're a lifeguard at a beach, but you're only allowed to watch from a helicopter or from a camera mounted on the boardwalk. Sure, you’ll see some splashing — maybe even a shark fin or two — but if something happens beneath the waves when you’re looking the other ... Read More

Contrast Security and Wiz Integration | Vulnerability Identification and Remediation
Applications are a prime target for cyberattacks. However, many organizations struggle with blindspots at the application layer. They may be doing scans today, but often they’re point-in-time scans leading to a plethora of false positives. Robust application security is essential to defend against these attacks that target everything from personal ... Read More

Zero-Day Attack Prevention with Contrast ADR | Real-Time Detection of Zero-Day Exploits of Unknown Vulnerabilities | Contrast Security
The majority — 11 out of 15 — of the top Common Vulnerabilities and Exposures (CVEs) in CISA’s most recent annual Cybersecurity Advisory (CSA) were initially exploited as zero days. ... Read More

Insecure Deserialization Trend | March Attack Data | Contrast Security
Cyberattackers are shifting their strategy in attacking applications and focusing on one of the most dangerous tactics. For the fourth straight month, the number one tactic was insecure deserialization, aka untrusted deserialization. And, after four months, we can call this a trend. ... Read More

How Contrast ADR Speeds up SOC Incident Response Time| SOC Challenges From Alert Fatigue to Application-Layer Visibility | Contrast Security
Just because you work in a security operations center (SOC) doesn’t mean you have to waste your time chasing dragons. And by “dragons,” we mean the traditional SOC’s difficulty identifying cyberattacks that originate in the black box of the application layer. ... Read More

Application Detection and Response Analysis: Why ADR? How ADR Works, and ADR Benefits
Two highly respected technology analysts from different cybersecurity disciplines are coming together to recommend that companies consider Application Detection and Response. Organizations face a constant barrage of cyber threats, including zero-day vulnerabilities that can exploit unknown weaknesses in software. Traditional security solutions often fall short in detecting and responding to ... Read More

ADR for PCI DSS 4.0 Compliance | Contrast Security
For any company involved in any facet of payment card processing, March 31, 2025, looms as the deadline for meeting the updated Payment Card Industry Data Security Standard (PCI DSS) version 4.0, first issued April 1, 2024 ... Read More

Application Attacks Rise Significantly | February Attack Data | Contrast Security
The number of attacks on individual applications are up significantly month to month, according to research from Contrast Security. The Contrast Labs team found that, on average, applications faced 77 real attacks in February — “real” attacks, as in, those that got past the web application firewall (WAF) and reached ... Read More