All resources sponsored by:

Contrast Security

24 Matches
AppSec for the Newly Hired CISO/CSO
sponsored by Contrast Security
EBOOK:For new CISOs and CSOs, the tasks and demands of the new role can be overwhelming – especially as digital transformation changes conventional approaches to application security. Read this e-book for AppSec guidance and best practices for new CISO/CIOs.
Posted: 22 Sep 2020 | Published: 22 Sep 2020
Get This Now


2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER:Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020
Get This Now


The DevSecOps Guide to Managing Open-Source Risk
sponsored by Contrast Security
WHITE PAPER:Open this eBook and examine how you can implement automation for tracking open source components in use, identifying risks, and enabling effective mitigation.
Posted: 04 Sep 2020 | Published: 04 Sep 2020
Get This Now


How Manual Application Vulnerability Management Delays Innovation and Increases Business Risk
sponsored by Contrast Security
EBOOK:More often than not, development and security teams are at odds. In fact, as many as 52% of companies admit to cutting back on security measures in order to meet business demands, according to Contrast Security. In this report, learn how organizations can approach security with fewer frustrations and more collaboration between teams.
Posted: 27 Aug 2020 | Published: 27 Aug 2020
Get This Now


Magic Quadrant for Application Security Testing
sponsored by Contrast Security
ANALYST REPORT:The Application Security Testing (AST) market has evolved quickly as organizations scramble to secure their cloud native and modernized applications. This Gartner Magic Quadrant assesses which vendors are leading the AST market right now, and what technologies are setting these providers apart.
Posted: 27 Aug 2020 | Published: 29 Apr 2020
Get This Now


Contrast OSS Helps DevOps Manage & Triage Hidden OSS Library Risk
sponsored by Contrast Security
EBOOK:Download this eBook to learn about a new approach to OSS security: Contrast OSS, and how it can help you prioritize critical vulnerabilities by tracking the libraries that actually get used during runtime operation.
Posted: 26 Aug 2020 | Published: 26 Aug 2020
Get This Now


Contrast DevOps-Native AppSec Platform
sponsored by Contrast Security
DATA SHEET:Open-source components have created an entirely new playing field for vulnerabilities and cyberattacks. Security strategies must incorporate security instrumentation to strengthen AppSec platforms and properly accommodate for these new security demands. Learn about the Contrast Security Platform and its 3 components in this guide.
Posted: 26 Aug 2020 | Published: 26 Aug 2020
Get This Now


Bringing an End to Security Roadblocks
sponsored by Contrast Security
EBOOK:From a developer’s perspective, legacy tools create delays at every turn. Luckily, this guide proposes a simple solution: security instrumentation. Learn how security instrumentation builds security monitoring and response into the application itself for continuous insight—and no bottlenecks. Read more here.
Posted: 26 Aug 2020 | Published: 26 Aug 2020
Get This Now


How legacy application security requires experts, time, and cost that degrade DevOps efficiencies
sponsored by Contrast Security
WHITE PAPER:Take a look through this white paper to learn how some of the legacy scanning-based appsec tools at your organization may be complicating your DevOps process, and how you can become even more efficient in deploying more secure apps.
Posted: 25 Aug 2020 | Published: 25 Aug 2020
Get This Now


A comprehensive approach to analyzing and protecting software
sponsored by Contrast Security
WHITE PAPER:Traditional application security approaches rely on a patchwork of disconnected tools and processes that really end up adding more noise than protection. Find out how you can sort through all of these false positives with this app security platform.
Posted: 24 Aug 2020 | Published: 24 Aug 2020
Get This Now


A major roadblock to business innovation
sponsored by Contrast Security
WHITE PAPER:When fast-moving developers encounter outdated security tools and processes, they are forced to delay releases in order to perform ineffective ceremonial exercises such as generating a scan. You need a more comprehensive and holistic approach to app security. Read this white paper to get started.
Posted: 24 Aug 2020 | Published: 24 Aug 2020
Get This Now


Understanding the risk of open-source software
sponsored by Contrast Security
WHITE PAPER:Open this white paper to learn more about the licensing and security risks of open-source software and how to overcome them.
Posted: 24 Aug 2020 | Published: 24 Aug 2020
Get This Now

TOPICS:  Open Source

Contrast OSS: Automated Open-Source Security Without the Noise
sponsored by Contrast Security
WHITE PAPER:Open-source software comes with its risks. Not only does your team have to work with complex licensing issues, but open source channels can lead to security vulnerabilities. These open-source risks require unique AppSec solutions. Learn how to get started with the right application security tools in this guide.
Posted: 20 Aug 2020 | Published: 20 Aug 2020
Get This Now


How to Secure APIs at DevOps Speed
sponsored by Contrast Security
WHITE PAPER:API vulnerabilities are becoming the most popular target for attacks, as traditional security measures often fail to protect APIs. Luckily, API security isn’t as far away as you think. In this eBook, learn how to begin an instrumentation-based approach to DevOps and API security.
Posted: 20 Aug 2020 | Published: 20 Aug 2020
Get This Now


NIST Application Security Revisions You Need to Know
sponsored by Contrast Security
RESOURCE:NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.
Posted: 21 Apr 2020 | Published: 21 Apr 2020
Get This Now


Continuous Application Security: A Unified Approach Across the SDLC
sponsored by Contrast Security
WEBCAST:This webinar makes the case for instrumentation-based unified application security. With IAST and RASP, the security strategy can detect vulnerabilities, prevent exploits, secure data, and maintain compliance. Watch the webinar now to find out more.
Posted: 20 Apr 2020 | Premiered: Apr 20, 2020
Get This Now


Security Instrumentation is the Future of All Software
sponsored by Contrast Security
WEBCAST:We’re in a software security crisis—and we have been for a while now. In both 2000 and 2019, applications had an average of 26.7 serious vulnerabilities. This webinar examines the state of application security and considers how strong instrumentation-based application security platforms are key to finally uniting development and security.
Posted: 20 Apr 2020 | Premiered: Apr 20, 2020
Get This Now


Securing APIs at DevOps Speed
sponsored by Contrast Security
WEBCAST:When APIs are insecure, we still have something to work with—and the sooner we’re aware of the security threats, the better. In this webinar, learn about the different approaches to API security and how API security can fit into DevOps methodologies for the best results. Watch the webinar here.
Posted: 17 Apr 2020 | Premiered: Apr 17, 2020
Get This Now


AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements
sponsored by Contrast Security
WHITE PAPER:The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.
Posted: 10 Apr 2020 | Published: 30 Mar 2020
Get This Now


Using Security Instrumentation to Analyze and Protect Software
sponsored by Contrast Security
WHITE PAPER:Instrumentation-based application testing can help improve security without skilled security staff or the need to change code. It can also help developers push code into production much faster than formal processes for testing and approval. Dive into this white paper to learn more about the advantages of using instrumentation to automate AppSec.
Posted: 09 Apr 2020 | Published: 09 Apr 2020
Get This Now


Contrast Assess Route Intelligence
sponsored by Contrast Security
DATA SHEET:Learn how Contrast Assess Route Intelligence transforms AppSec by observing the routes of an application while it’s running—thereby exposing all the different points of entry into the application.
Posted: 09 Apr 2020 | Published: 09 Apr 2020
Get This Now


Perimeter Security Noise Leaves Applications Vulnerable to Attacks
sponsored by Contrast Security
WHITE PAPER:Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.
Posted: 08 Apr 2020 | Published: 08 Apr 2020
Get This Now


A Comprehensive Approach to DevSecOps
sponsored by Contrast Security
WHITE PAPER:More than half of organizations in a recent study say that their security team has reached a tipping point where the number of security tools in place has adversely impacted their security posture and increased risk. Stuck in the AppSec tool swamp? Learn about a unified AppSec platform that can alleviate this problem.
Posted: 08 Apr 2020 | Published: 08 Apr 2020
Get This Now


The Continuous Application Security Handbook
sponsored by Contrast Security
EBOOK:With widespread enterprise reliance on automated software and applications, security has become a concern that haunts just about every tech-driven business. Download this handbook for a look into continuous application security, and how to establish the three key layers of security within your own applications.
Posted: 25 Jul 2019 | Published: 31 Dec 2017
Get This Now


24 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info