IAST

7 Battle-Tested Tips for Using a DAST Scanner
While modern web applications are growing in complexity, the threat landscape is also constantly evolving. It can be difficult for developers to identify and remediate vulnerabilities The post 7 Battle-Tested Tips for ...

6 Tips to Setup Foolproof AWS Security Groups
Adopting cloud technologies is one of the most common tech strategies followed by modern organizations. This may be due to various reasons depending on the nature The post 6 Tips to Setup ...

What is OS Hardening and How Can Developers Implement it
As cyber threats become increasingly advanced and complex, organizations are forced to adopt a military attitude of ‘war footing’ to secure their systems and servers. Although The post What is OS Hardening ...

Debunking myths around RASP (Runtime Application Self-Protection) technology
Welcome to the second part of this series examining some of the myths that I’ve heard in many conversations around Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) while working ...

Contrast Assess is a select product for IAST in IDC’s TechBrief
Contrast Security today has been included as a select product for Interactive Application Security Testing in the IDC TechBrief, Interactive Application Security Testing, (doc #US49376522, July 2022). According to the IDC Tech ...

Debunking IAST myths
If you have followed Contrast's progress over the years, you will recognize us as a leading provider of Interactive Application Security Testing (IAST)/ Runtime Application Self-Protection (RASP) (and recently Static Analysis Security ...

K2 can protect against Log4J without patching
The Log4J vulnerability has been given a CVSS Score of 10, making it the most serious of discovered flaws. VentureBeat is reporting that Log4J attacks have been attempted on 44% of corporate networks. Find out how to protect against Log4J attacks. The post ...

Can Your IAST Do This?
While Interactive Application Security Testing (IAST) is still a relatively new technology from the perspective of adoption, it has been around for over 10 years and some of the aspects and capabilities around IAST are well understood, such as ...

Experts Say Cyber Attacks Are Getting Worse
A new article on WNEP is reporting on experts who claim that cyber attacks are getting worse. Not surprising at the top of the list is ransomware attacks., which have made headlines, ...

Mitre Top 25 Software Weaknesses
In addition to OWASP finally updating the Top 10 Web Application Risks, this year Mitre also updated their Top 25 Most Dangerous Software Bugs, also known as the CWE Top 25. One ...