ADR and Runtime Security are Reshaping AppSec as the Application Layer Becomes the Prime Target | IDC Northstar Research | Contrast Security

ADR and Runtime Security are Reshaping AppSec as the Application Layer Becomes the Prime Target | IDC Northstar Research | Contrast Security

In a new June 2025 research note, IDC highlights a major shift in how enterprises are thinking about Application Security (AppSec). The IDC Link Research Note covers Contrast Security’s Northstar release and ...
Insecure Deserialization Trend | March Attack Data | Contrast Security

Insecure Deserialization Trend | March Attack Data | Contrast Security

Cyberattackers are shifting their strategy in attacking applications and focusing on one of the most dangerous tactics. For the fourth straight month, the number one tactic was insecure deserialization, aka untrusted deserialization ...
Application Detection and Response (ADR) Gives the SOC Deep Visibility into the Application Layer | Contrast Security

Application Detection and Response (ADR) Gives the SOC Deep Visibility into the Application Layer | Contrast Security

The life of a Security Operations Center (SOC) analyst is often compared to navigating a vast and dangerous ocean. While tools like Intrusion Detection Systems (IDS), Cloud-Native Application Protection Platforms (CNAPP), and ...
Award Finalist: Contrast Security Application Detection and Response

Award Finalist: Contrast Security Application Detection and Response

Less than a month after we at Contrast Security announced Application Detection and Response, it is already a finalist for a major cybersecurity award.  ...
Award Finalist: Contrast Security Application Detection and Response

Award Finalist: Contrast Security Application Detection and Response

Less than a month after we at Contrast Security announced Application Detection and Response (ADR), it is already a finalist for a major cybersecurity award.  ...
Application Detection and Response: Understanding ADR’s Detection and Response Layers | Contrast Security

Application Detection and Response: Understanding ADR’s Detection and Response Layers | Contrast Security

Airport security is a lot like cybersecurity. Each is a cumbersome process aimed at protecting valuable assets. Both involve detection and response. In both airport and cyber security, the approach is to ...
Georgia layer

Understanding and Preventing Layer 7 Attacks

The open systems interconnection (OSI) is a reference model for layering interoperability and networking of communicating systems via standard protocols. Even though cybersecurity attacks can happen anywhere in the OSI model, Layer ...
Security Boulevard
application layer security

Eye on the End User: Application Layer Security

The application layer is where users interact with your apps, so its security should be paramount. Here are a few considerations Securing applications can be a struggle at the best of times ...
Security Boulevard