Watch a short (9:08) high-level overview and see for yourself how Contrast Security makes software self-protecting so it can defend itself from vulnerabilities & attacks.
Jeff Williams catches up with Scott Parson from a Fortune 500 Financial Institution to discuss instrumenting application security.
Jeff Williams and Tim Chase, from Nielsen, discuss what it means to have continuous application security at his company.
Jeff Williams talks with John Monagle of General Catalyst, in regards to investing in AppSec, how the DevOps movement is changing the market and Contrast's role in it.
If you want to really scale Rugged DevOps, you need to get the humans out of the critical path. In this recording you'll hear how Tim Chase of Nielsen is scaling DevOps to acchieve continuous protection during both development and operations.
Learn why the widespread flaw makes Heartbleed look tame. Also, learn how RASP technology is perfectly suited to protect applications vulnerable to Java deserialization exploits and many other types of attacks.
Gartner has recognized a new category of application security calling it Runtime Application Self-Protection (RASP). RASP is “transformational” because it enables new ways of securing business. But, how can applications protect themselves against attacks, especially if those protections weren’t built in by the app developers?
See how a unique technology let’s you build applications that accurately self-diagnose vulnerabilities and self-protect against attacks, without changing a line of code.
It is time to learn about interactive application security testing (IAST), a technology that is transforming the way businesses approach finding and remediating vulnerabilities.
Listen to Jeff Williams, CTO of Contrast Security and co-founder of OWASP, in a lively conversation with Gene Kim, researcher, author, Tripwire founder. Jeff and Gene will discuss DevOps and continuous app security.
Listen to Jeff Williams, CTO of Contrast Security and co-founder of OWASP, discuss topics regarding risk and compliance in an overall security program.
Listen as we discuss some of the pitfalls of legacy application security tools and why they have failed. We will then introduce a new approach for securing applications that will help you break your security bottleneck with a breakthrough solution.
On this episode of The Security Influencers Channel, we're joined by Bill Brenner. He's the Senior Program Manager for Editorial in the Information Security Group at Akamai.
In the podcast, we discuss how Agari reached the point where it is protecting 85% of all email boxes in the world and what its plans are from there.
In the podcast, we discuss John's background as a nuclear physicist turned security professional and why nhe believes in an "evidence-based" approach to security.
In the podcast, we discuss a predictions blog post that Andrew wrote in December of 2013 where he predicted five security "happenings" for 2014.
In this episode, Michele explains the meaning of a term she coined, "Security Stoogecraft," and why she feels it is the best way to describe today's security landscape.
In this episode, we talk about how we get developers to do their own security and why he views security as one of the "hardest careers out there."
Troy and I discuss all of the recent high profile security breaches of Target, Home Depot and Apple and what that means for the state of security in today's landscape.
Today, we're talking with my good friend, Samy Kamkar. Samy is a security and privacy researcher, computer hacker, whistleblower, entrepreneur.
In this episode, John and I discuss the evolution of application security and how the trend in faster development cycles plays into the security life cycle.
In this episode, we're talking with Bradley Schaufenbuel. Brad is currently the Director of Information Security at Midland States Bank and held security leadership positions at many leading financial institutions.
In this episode, Jeff Williams interviews Alex Hutton, the director of information security at Too Big to Fail Bank. Alex was previously employed by Verizon, where he worked on modeling risk and contributing to the Verizon data breach report.
In this episode, Jeff Williams interviews Wayne Jackson of Sonatype. They discuss the results from The 2014 Open Source Development Survey, where developers gave their honest opinions on everything from third-party code to internal policies and procedures.
In this episode, Jeff Williams interviews Andrew Hay of Open DNS. They discuss bad credential management and the recent eBay breach, thinking with the mind of an attacker, firewalls and security in the cloud.
In this episode, Jeff Williams interviews Bruce Brody of Cubic Cyber Solutions, a leading provider of specialized systems and services in the rapidly changing world of technology.
In this episode, Jeff Williams interviews Jonathan Chow and Neeta Maniar of Live Nation Entertainment: The world's leading producer and promoter of live entertainment, and the parent company of Ticket Master and The House of Blues.