Contrast Security Founder Jeff Williams explains how to fix AppSec in production | Contrast Security

Contrast Security Founder Jeff Williams explains how to fix AppSec in production | Contrast Security

One of the most memorable parts of Black Hat was an interview with Alan Shimel of TechStrong TV and Katie Norton, Research Director at IDC. We had a wide-ranging discussion about the ...
How ADR fixes AppSec in production | Contrast Security Founder Jeff Williams Explains | Contrast Security

How ADR fixes AppSec in production | Contrast Security Founder Jeff Williams Explains | Contrast Security

One of the most memorable parts of Black Hat was an interview with Alan Shimel of TechStrong TV and Katie Norton, Research Director at IDC. We had a wide-ranging discussion about the ...
pen testing, Salt Security, API, APIs, attacks, testing, PTaaS, API security, API, cloud, audits, testing, API security vulnerabilities testing BRc4 Akamai security pentesting ThreatX red team pentesting API APIs Penetration Testing

Salt Security Extends Scope of API Security Platform

Salt Security this week extended its core platform to make it easier to discover and govern application programming interfaces (APIs) ...
Security Boulevard
ADR Security Technology for AppSec Vulnerabilities | Contrast Security

ADR Security Technology for AppSec Vulnerabilities | Contrast Security

On Aug. 6, Contrast Security introduced a new security technology we call Application Detection and Response (ADR). ADR seeks to fill a critical gap in Application Security (AppSec) that leaves the application ...
threat modeling, ICS, VPNs, APIs, risk, left-of-bang, threats, vulnerabilities, XDR, zero-trust, attack, XDR API Skyhawk Security modeling threat CosmicStrand insider threats Threat Modeling - Secure Coding - Cybersecurity - Security

API Transformation Cyber Risks and Survival Tactics

As you think about how to ensure your APIs are within your risk tolerance, ensure that you have a sound understanding of your inventory and the data associated with them ...
Security Boulevard
Discover Aembit banner

An Open Letter to API Vendors: Embrace Secure Authentication Methods, Abandon API Keys

3 min read As the demand for API access continues to grow, so does the urgency of adopting more secure authentication methods. The post An Open Letter to API Vendors: Embrace Secure ...
a laptop on a wooden desk.

API Vulnerabilities Found Across AI Infrastructure Projects at NVIDIA, Mercedes

AI is rapidly increasing the pace of API creation within organizations, leading to API security becoming as significant as traditional application security. Here’s what you can learn from the top five API ...
Security Boulevard
Cybersecurity Insights with Contrast CISO David Lindner | 3/29/24

Cybersecurity Insights with Contrast CISO David Lindner | 3/29/24

Insight #1 According to Google, zero days being exploited in the wild jumped 50% last year. I just don't understand your thought process if you are not looking at control layers like ...

VulnCheck’s Free Community KEV & CVE APIs (Code & Golang CLI Utility)

VulnCheck has some new, free API endpoints for the cybersecurity community. Two extremely useful ones are for their extended version of CISA’s KEV, and an in-situ replacement for NVD’s sad excuse for ...
Cybersecurity Insights with Contrast CISO David Lindner | 3/22/24

Cybersecurity Insights with Contrast CISO David Lindner | 3/22/24

Insight #1 Things are well and good in the hacker community, as they are now attacking critical water systems. But honestly, one of the attacks was due to a default admin password ...

Application Security Check Up