Syndicated Blog

AppSec Observer
Contrast’s application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.
How Runtime Security Protects Apps from Legacy COTS and API Vulnerability Risks | Contrast Security

How Runtime Security Protects Apps from Legacy COTS and API Vulnerability Risks | Contrast Security

It used to be that the weakest link in the enterprise IT security chain was the user, but times have changed.  ...
Cybersecurity Insights with Contrast CISO David Lindner | 2/23/24

Cybersecurity Insights with Contrast CISO David Lindner | 2/23/24

Insight #1 The post quantum encryption era is upon us, and Apple is leading the charge to protect against future quantum computing attacks by boosting security on its iMessage platform, adding a ...
Elevate Node.js Security with v5 Node Agent | Contrast Security

Elevate Node.js Security with v5 Node Agent | Contrast Security

Node.js is an incredibly popular programming environment, highly regarded for its efficiency and scalability. It powers a wide range of applications, from web applications to real-time chat applications, application programming interfaces (APIs) ...
Cybersecurity Insights with Contrast CISO David Lindner | 2/16/24

Cybersecurity Insights with Contrast CISO David Lindner | 2/16/24

Insight #1 How are you protecting your web and application programming interface (API) applications from attack? In 2023, Contrast Protect blocked 12 million legitimate attacks (including zero days such as the recent ...
Cybersecurity Insights with Contrast CISO David Lindner | 2/9/24

Cybersecurity Insights with Contrast CISO David Lindner | 2/9/24

Insight #1 From toasters to toothbrushes, the Internet of Things (IoT) continues to wreak havoc on the internet. As consumers, it's important to balance necessity with risk, just like with everything else.  ...
Cybersecurity Insights with Contrast CISO David Lindner | 2/2/24

Cybersecurity Insights with Contrast CISO David Lindner | 2/2/24

Insight #1 Ransomware payments dropped to 29% in the last quarter of 2023. Will ransomware be a thing if victims stop paying completely? It seems we are getting closer to that reality ...
Zero-day Confluence RCE Vulnerability Blocked by Contrast Runtime Security | CVE-2023-22527 | Contrast Security

Zero-day Confluence RCE Vulnerability Blocked by Contrast Runtime Security | CVE-2023-22527 | Contrast Security

If your organization is running an older version of Atlassian Confluence Server that’s affected by CVE-2023-22527 — the critical remote-code execution (RCE) zero day discovered recently — you either ...
Cybersecurity Insights with Contrast CISO David Lindner | 1/26/24

Cybersecurity Insights with Contrast CISO David Lindner | 1/26/24

Insight #1 Spray and pray: That’s the modus operandi behind the latest successful attack against Microsoft, which resulted in compromise of the company’s email systems. The attackers reportedly got in through an ...
6 Cybersecurity Best Practices to Secure Sensitive Data | Contrast Security

6 Cybersecurity Best Practices to Secure Sensitive Data | Contrast Security

| | Data Privacy Week
In honor ofData Privacy Week 2024 — the theme of which is “Take Control of Your Data” — here’s a collection of cybersecurity best practices on how to do just that.  ...
Data Privacy Week: Are you ready to become a data privacy snob?

Data Privacy Week: Are you ready to become a data privacy snob?

Welcome to Data Privacy Week 2024, brought to us once again courtesy of the National Cybersecurity Alliance (NCA).  ...