rasp
What is DORA? | Compliance Requirements for EU DORA Regulations | Contrast Security
Cyberattacks, supply-chain issues, flooding, tsunamis, wildfires, equipment failures and even war: The financial sector has no choice but to keep operations running through all these — among other — types of disruptions, ...
Zero Reasons not to Move to Zero Trust with RASP
What is Zero Trust? Zero Trust is a security methodology that enterprises are rapidly adopting to enhance data protection by reducing the sole reliance on traditional perimeter-based protections. Traditionally, cybersecurity strategies have ...
Using RASP to Protect Applications and Comply with the PCI DSS
Public-facing web applications are ripe targets for attackers. These applications need security to protect against attacks as well as identify […] ...
Log4j vulnerabilities still an issue, but CodeSec audit can help | Contrast Security
Landing on the incident response boards for software engineering teams worldwide in December 2021, the Log4j vulnerabilities in Java software remain a real concern for developers more than 9 months later.Apache Log4j ...
Building a modern API security strategy — API protection
Part four of the five-part series, Building a modern API security strategy ...
Debunking myths around RASP (Runtime Application Self-Protection) technology
Welcome to the second part of this series examining some of the myths that I’ve heard in many conversations around Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) while working ...
More than 40 billion records exposed in 2021
Security Brief Asia is reporting on new research showing more than 40 billion records were exposed by data breaches in 2021. According to the research from Tenable's Security Response Teams, they found ...
A Quick Look at the New OWASP Top 10 for 2021
Back in September of 2021 we wrote that the OWASP working group had a draft of latest Top 10 Web Application Security Risks, their first update since the 2017 revision. The working ...
The Final Count: Vulnerabilities Up Almost 10% in 2021
ow that 2021 has ended, we can see the final tally of vulnerabilities recorded for 2021. The year ended with a total of 20,061 vulnerabilities recorded, 9.3% over the prior year and ...
93% of Tested Networks Vulnerable to Breach
Nearly every organization can be infiltrated by cyber attackers, based on data from dozens of penetration tests and security assessments. The vast majority of businesses can be compromised within a month by ...