Top 4 Application Attacks Detected and Blocked by Contrast ADR | XSS, Method Tampering, Path Traversal and JNDI Injection | Contrast Security

Top 4 Application Attacks Detected and Blocked by Contrast ADR | XSS, Method Tampering, Path Traversal and JNDI Injection | Contrast Security

The Contrast Security Runtime Security Platform — the engine that underpins Contrast’s Application Detection and Response (ADR) technology — blocked approximately 47K cybersecurity attacks during the month of August 2024.  ...
Award Finalist: Contrast Security Application Detection and Response

Award Finalist: Contrast Security Application Detection and Response

Less than a month after we at Contrast Security announced Application Detection and Response, it is already a finalist for a major cybersecurity award.  ...
Award Finalist: Contrast Security Application Detection and Response

Award Finalist: Contrast Security Application Detection and Response

Less than a month after we at Contrast Security announced Application Detection and Response (ADR), it is already a finalist for a major cybersecurity award.  ...
Contrast Security Founder Jeff Williams explains how to fix AppSec in production | Contrast Security

Contrast Security Founder Jeff Williams explains how to fix AppSec in production | Contrast Security

One of the most memorable parts of Black Hat was an interview with Alan Shimel of TechStrong TV and Katie Norton, Research Director at IDC. We had a wide-ranging discussion about the ...
How ADR fixes AppSec in production | Contrast Security Founder Jeff Williams Explains | Contrast Security

How ADR fixes AppSec in production | Contrast Security Founder Jeff Williams Explains | Contrast Security

One of the most memorable parts of Black Hat was an interview with Alan Shimel of TechStrong TV and Katie Norton, Research Director at IDC. We had a wide-ranging discussion about the ...
ADR Security Technology for AppSec Vulnerabilities | Contrast Security

ADR Security Technology for AppSec Vulnerabilities | Contrast Security

On Aug. 6, Contrast Security introduced a new security technology we call Application Detection and Response (ADR). ADR seeks to fill a critical gap in Application Security (AppSec) that leaves the application ...
What is an island hopping cybersecurity attack? | Cyber Bank Heists Report | Contrast Security

What is an island hopping cybersecurity attack? | Cyber Bank Heists Report | Contrast Security

Cyber Bank Heists report sheds light on the evolution of island-hopping cyber threats This year’sCyber Bank Heists report by Contrast Security was eye-opening. The annual report sheds light on the cybersecurity threats ...

Q1 2022 DDoS and Application Attack Activity: An Overview

The cybersecurity threat landscape in the first quarter of 2022 represented a mix bag of old enemies and new foes. New actors dominated the DDoS threat landscape while application security faced tried-and-true ...
When You Get Breached, So Do Your Customers

When You Get Breached, So Do Your Customers

No industry is immune to emerging attack vectors. Here are some of the primary attack types that are targeting SaaS providers. The post When You Get Breached, So Do Your Customers appeared ...
How to Prepare for Cyber Threats Targeting the Olympics

How to Prepare for Cyber Threats Targeting the Olympics

While connectivity provides a better user experience, additional technology and innovation can create a larger attack surface for cybercriminals. The post How to Prepare for Cyber Threats Targeting the Olympics appeared first ...