Zero-day Confluence RCE Vulnerability Blocked by Contrast Runtime Security | CVE-2023-22527 | Contrast Security

Zero-day Confluence RCE Vulnerability Blocked by Contrast Runtime Security | CVE-2023-22527 | Contrast Security

If your organization is running an older version of Atlassian Confluence Server that’s affected by CVE-2023-22527 — the critical remote-code execution (RCE) zero day discovered recently — you either ...
Approov Addresses Apple Watch Security Issues

Approov Addresses Apple Watch Security Issues

Apple and MIT recently published a study indicating that 2.6 billion personal records were exposed through data breaches over the last two years. These findings underscore the need for protecting data in ...
Contrast Security recognized in the 2023 Gartner® AppSec Testing Voice of the Customer report

Contrast Security recognized in the 2023 Gartner® AppSec Testing Voice of the Customer report

The 2023 Gartner Peer Insights™ “Voice of the Customer”: Application Security Testing report has recognized Contrast Security as garnering approval from most customers, with 94% of Contrast customers being willing to recommend ...
Top Security Trends and Predictions for 2024

Top Security Trends and Predictions for 2024

Approov stands at the forefront of mobile cybersecurity: Our expansive customer base, ongoing research initiatives and the insights we collect from our live threat metrics, give us unique visibility into trends in ...
The Rise of Super Apps: Challenges & Opportunities in Mobile Security

The Rise of Super Apps: Challenges & Opportunities in Mobile Security

In recent years, the tech world has witnessed a significant shift towards what are known as "super apps." These mobile applications have become increasingly popular, offering a plethora of services within a ...
What is DORA? | Compliance Requirements for EU DORA Regulations | Contrast Security

What is DORA? | Compliance Requirements for EU DORA Regulations | Contrast Security

Cyberattacks, supply-chain issues, flooding, tsunamis, wildfires, equipment failures and even war: The financial sector has no choice but to keep operations running through all these — among other — types of disruptions, ...

Zero Reasons not to Move to Zero Trust with RASP

What is Zero Trust?  Zero Trust is a security methodology that enterprises are rapidly adopting to enhance data protection by reducing the sole reliance on traditional perimeter-based protections.  Traditionally, cybersecurity strategies have ...
Using RASP to Protect Applications and Comply with the PCI DSS

Using RASP to Protect Applications and Comply with the PCI DSS

Public-facing web applications are ripe targets for attackers. These applications need security to protect against attacks as well as identify […] ...
Log4j still an issue, but CodeSec audit can help

Log4j vulnerabilities still an issue, but CodeSec audit can help | Contrast Security

Landing on the incident response boards for software engineering teams worldwide in December 2021, the Log4j vulnerabilities in Java software remain a real concern for developers more than 9 months later.Apache Log4j ...
Building a modern API security strategy — API protection

Building a modern API security strategy — API protection

| | API security, APIs, rasp
Part four of the five-part series, Building a modern API security strategy ...

Secure Guardrails