ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Contrast Security

  • Revolutionizing DAST with IAST: A new era in application security

    This white paper explores how Interactive Application Security Testing (IAST) transforms Dynamic Application Security Testing (DAST). It highlights IAST's ability to analyze applications internally, offering deeper insights and reducing false positives. Discover how IAST enhances security testing accuracy and efficiency.

  • Revolutionizing DAST with IAST: A new era in application security

    This white paper explores how Interactive Application Security Testing (IAST) enhances Dynamic Application Security Testing (DAST) by providing deeper insights into code vulnerabilities and data flows. It introduces Contrast Security's Runtime Security Platform, improving AppSec testing with real-time monitoring. Learn how IAST surpasses DAST.

  • Understanding the risks of the software supply chain

    The software supply chain is increasingly vulnerable to security risks like malicious code and licensing issues. Learn how to address these challenges and secure your applications by reading this Contrast Security white paper.

  • Understanding Contrast ADR

    In this video, Jeff Williams, Founder and CTO of Contrast Security, chats with Chris Hughes, CEO of cybersecurity consulting firm Aquia and a former Cyber Innovation Fellow (CIF) at the U.S. Cybersecurity and Infrastructure Security Agency (CISA), about Contrast Application Detection and Response (ADR).

  • The benefits of Application Detection and Response

    In this video, Naomi Buckwalter, Senior Director of Product Security at Contrast Security, describes the blindspot security teams are grappling with: scant visibility into the application layer. Luckily, this is a blindspot that Contrast ADR eliminates.

  • Introducing Contrast ADR

    Contrast ADR monitors, detects and blocks applications attacks before they spill over into the infrastructure. This video demonstrates the safety and power of running Contrast ADR in 'block mode'. Watch a 5-minute demo showcasing how Contrast ADR enables SOC teams to see and stop application and API attacks.

  • Experts: Why the Log4Shell Grinch is still hanging around

    Three years after its discovery, Log4Shell remains a stark reminder of systemic cybersecurity challenges, highlighting concerns around software supply chains and open-source software. Despite patches and mitigations, this critical vulnerability persists, buried deep within third-party libraries and legacy systems.

  • 12 things to know about ADR

    Traditional security tools overlook the application layer, where modern threats like zero-days and API vulnerabilities thrive. Application Detection and Response (ADR) bridges this critical gap, offering real-time, in-depth protection. Discover how Contrast ADR protects your applications without slowing innovation.

  • Unpacking the SEC cybersecurity reporting rules: Enhance compliance efforts and reduce risk with ADR

    The SEC's new cybersecurity reporting rules demand timely, detailed disclosure of material incidents within four days—a challenging standard that many companies struggle to meet. Read this blog to learn why tools like Application Detection and Response (ADR) are essential for real-time monitoring, rapid response and robust documentation.

  • November: The top attacks ADR caught on the brink of exploit

    Applications and APIs face relentless threats, with an average of 50 confirmed attacks per app slipping past traditional defenses. Discover how Contrast ADR provides real-time application layer visibility to safeguard your systems.

  • Silent but deadly: December sees deserialization attacks surge despite overall lull in app attacks

    While December 2024 saw a slight decline in overall application and API attacks, unsafe deserialization attacks surged, averaging 22 attempts per app. Contrast Application Detection and Response (ADR) identified these attacks in real time, filtering out false positives to focus only on genuine attacks.

  • Anatomy of a modern application attack

    This ebook dives into the mechanics of a common application attack, using the infamous Log4Shell vulnerability as an example and demonstrates how application detection and response (ADR) technology — particularly Contrast ADR — effectively safeguards against such threats.

  • How to fix your cybersecurity blindspot

    This eBook explores the growing threat of application and API attacks, focusing on how modern security solutions like Contrast ADR can bridge critical gaps left by traditional security tools. Through real-world case studies and technical insights, it shows how Contrast ADR offers effective detection of zero-day threats within the application layer.

  • AppSec noise and fatigue by the numbers

    Traditional security tools like SAST and DAST are falling behind in the fight against modern threats—hampered by false positives, slow remediation, and inefficiency. See how Contrast Security's IAST revolutionizes security and accelerates protection.

  • Understanding the risks of the software supply chain

    This year alone, successful vulnerability exploits exposed tens of thousands of organizations and applications to malicious activity. Read this white paper to learn how much application code is comprised of open source—and what percentage of that open-source code is ever excised by the application.

  • What is a vulnerability?

    Larry Maccherone, a thought leader on DevSecOps, Agile, and analytics, is unimpressed with the common definition of security vulnerability. In this on-demand webinar, discover the simple change in language that can help AppSec teams more effectively defend against one of bad actors’ favorite methods.

  • What is a vulnerability?

    Larry Maccherone, a thought leader on DevSecOps, Agile, and analytics, is unimpressed with the common definition of security vulnerability. In this on-demand webinar, discover the simple change in language that can help AppSec teams more effectively defend against one of bad actors’ favorite methods.

  • The value of Runtime Security for the financial sector: Why current Application Security approaches too often fall flat

    Financial services face rising cyber threats like island hopping and exploited vulnerabilities. Learn how to safeguard applications with insights from Contrast Security and AWS experts in this informative video.

  • The value of Runtime Security for the financial sector: Why current Application Security approaches too often fall flat

    Watch this webinar to break down the state of application security and threat landscape for financial services companies, alongside experts from Contrast Security and AWS. Don’t risk missing best practices for improving app security and the benefits of implementing runtime security covered.

  • Strategic evolution of DevSecOps: Interview with Larry Maccherone at RSA Conference 2024

    Runtime security is the future of AppSec, says Larry Maccherone. Learn how the strategic evolution of DevSecOps is shifting testing to production in this interview from RSA 2024. Watch the full video to explore the benefits of this approach.

  • Are you ready for DORA?

    Prepare your organization for the EU's Digital Operational Resilience Act (DORA) with this checklist to assess your readiness. Learn how Contrast Security can help you secure your applications and take a key step towards DORA compliance. Read the full infographic to get started.

  • Voice of the Customer for Application Security Testing

    This Gartner Peer Insights report provides insights on application security testing tools based on user reviews. Explore vendor ratings, willingness to recommend, and segment views to inform your buying decision. Read the full report for a comprehensive voice of the customer perspective.

  • The limitations of existing Application Security (AppSec) approaches

    This infographic explores the limitations of common application security approaches like WAFs and EDR solutions. It highlights their lack of visibility into application-level threats and the need for more robust application security. Read the full infographic to learn how you can better protect your applications.

  • Contrast Security discovers Netflix OSS Genie bug that can lead to RCE during file upload

    Vulnerabilities gone undetected are arguably the most dangerous threat to any organization. Contrast Assess aims to be at the forefront of the discovery process, continuously detecting and prioritizing vulnerabilities to guide dev teams on how to eliminate risks. Read this blog for a walkthrough of how they discovered an open-source system bug.

  • Application Security observability

    As the network perimeter extends everywhere users are, security must move with it and be in place at the point of access. Download this infographic to learn 16 key things about observability and how it can help secure remote access and build user trust.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.