Watch a demonstration of Contrast, presented by Jeff Williams, Contrast CTO & Co-founder in conversation with Ed Amoroso, former CISO of AT&T and Founder of TAG Cyber.
Watch a short high-level overview and see for yourself how Contrast Security makes software self-protecting so it can defend itself from vulnerabilities & attacks. (09:08)
Watch this short video and see how Contrast works with Agile and Devops processes to accomplish maximum security at maximum speed for all application deployments. (01:06)
Watch this short overview video to see how Contrast uses instrumentation to deploy and more accurately identify application vulnerabilities in minutes, without experts or legacy SAST and DAST testing tools. (01:11)
Watch this short overview video to see how Contrast Protect leverages Runtime Application Self-Protection (RASP) and patented deep security instrumentation to protect applications against cyber-attacks in real-time and make it the most accurate, fastest and scalable application security solution. (01:39)
Watch this short video and see how Contrast Security protects applications and blocks SQL injection attacks better than WAF's. (01:17)
Watch first hand how Contrast Protect avoids the need for WAF's by working from the inside of a running application to provide better visibility and accuracy of finding and blocking attacks. (02:32)
Contrast Assess (IAST solution) deploys an intelligent agent that instruments the application with smart sensors to analyze code in real time from within the application, without disrupting your process. (01:20)
Watch this short overview video to learn how instrumentation works to find vulnerabilities, insecure libraries, and how it compares to other security testing methodologies. (01:27)
Contrast Security CEO, Alan Naumann chats with former CISO of AT&T Ed Amoroso on the importance of software security, DevOps initiatives, and the future of digital transformation. (10:06)
Hear a conversation with Contrast Security CTO, Jeff Williams and former CISO of AT&T, Ed Amoroso, as they discuss how to approach application security and what the future of cyber security looks like. (10:18)
In this video, hear Scott Parson, Senior Enterprise Security Architect of a Fortune 500 Financial Company, discuss the importance of continuous application security and how automation and cloud infrastructure has impacted his organizations approach to application security. (02:25)
In this brief video, hear Tim Chase, Director of Application Security and Architecture at Nielson, discuss the importance of continuous application security and what he thinks the future will hold for security testing, including DevSecOps. (02:15)
In this video, Jeff Williams, CTO of Contrast Security, talks with John Monagle of General Catalyst, in regards to investing in application security, how the DevOps movement is changing the market, and Contrast's role in this transformation. (03:15)
Hear Brian Gillooly, VP of Events Content & Strategy, Dark Reading in an in-depth conversation with Jeff Williams, CTO, Contrast Security. Topics included revolutionary changes taking place in both application security and DevOps as well as Jeff’s prestigious nomination as one of the three finalists in the "Most Innovative Thought Leader" category for his work as a cyber security innovator. (12:57)
Watch this short video and hear from Director of Test, John Scarborough on how he defines Interactive Application Security Testing (IAST). (00:39)
Establishing a DevOps-ready security program is possible. In this video, hear from 3 folks who have successfully built and scaled the DevOps functions within their organizations. (01:31)
Watch this short video and hear how Steve Herrod, Managing Director of General Catalyst Partners, defines and uses RASP technology as a decision-making tool. (00:35)
The Equifax breach was a watershed moment for software application security. The root cause is confirmed to be a web application security issue tied to a widely used software framework called Apache Struts 2. To gain a better understanding of these events, listen to this webinar to learn how to shield yourself against Struts 2 attacks and how the team at Contrast Labs saw these issues and continues to see exploit attempts. (35:00)
In 40-minutes you'll hear how Tim Chase, Director of Application Security and Architecture at Nielsen, is scaling Rugged DevOps and achieving continuous protection during development and operations by instrumenting the software application portfolio, assessing and protecting applications in parallel, and deploying integrations that provide instant notification. (42:00)
Hear Jeff Williams, Contrast Security Co-founder & CTO, discuss how government agencies can scale their DevOps functions by instrumenting their application portfolio, assessing and protecting applications in parallel, and deploying integrations that provide instant notifications. (1 hour)
Jeff Williams, Contrast Security CTO, presents the “Three Ways of Security”, an interpretation of the DevOps classic, “The Phoenix Project”. In this video, you’ll learn how to get your security work flowing, create continuous security feedback, and create a culture of security experimentation and learning. (72:00)
Learn why the widespread flaw makes Heartbleed look tame. Also, learn how RASP technology is perfectly suited to protect applications vulnerable to Java deserialization exploits and many other types of attacks. (43:04)
Gartner has recognized a new category of application security calling it Runtime Application Self-Protection (RASP). RASP is “transformational” because it enables new ways of securing business. But, how can applications protect themselves against attacks, especially if those protections weren’t built in by the app developers?
See how a unique technology let’s you build applications that accurately self-diagnose vulnerabilities and self-protect against attacks, without changing a line of code. (54:00)
See how Contrast stacks up against the OWASP Benchmark in this on-demand video. The results are illuminating. (55:00)
It is time to learn about interactive application security testing (IAST), a technology that is transforming the way businesses approach finding and remediating vulnerabilities. (1 hour)
Listen to Jeff Williams, CTO of Contrast Security and co-founder of OWASP, in a lively conversation with Gene Kim, researcher, author, Tripwire founder. Jeff and Gene will discuss DevOps and continuous app security. (45:00)
Listen to Jeff Williams, CTO of Contrast Security and co-founder of OWASP, discuss topics regarding risk and compliance in an overall security program. (21:12)
On this episode of The Security Influencers Channel, we're joined by Bill Brenner. He's the Senior Program Manager for Editorial in the Information Security Group at Akamai.
In the podcast, we discuss how Agari reached the point where it is protecting 85% of all email boxes in the world and what its plans are from there.
In the podcast, we discuss John's background as a nuclear physicist turned security professional and why nhe believes in an "evidence-based" approach to security.
In the podcast, we discuss a predictions blog post that Andrew wrote in December of 2013 where he predicted five security "happenings" for 2014.
In this episode, Michele explains the meaning of a term she coined, "Security Stoogecraft," and why she feels it is the best way to describe today's security landscape.
In this episode, we talk about how we get developers to do their own security and why he views security as one of the "hardest careers out there."
Troy and I discuss all of the recent high profile security breaches of Target, Home Depot and Apple and what that means for the state of security in today's landscape.
Today, we're talking with my good friend, Samy Kamkar. Samy is a security and privacy researcher, computer hacker, whistleblower, entrepreneur.
In this episode, John and I discuss the evolution of application security and how the trend in faster development cycles plays into the security life cycle.
In this episode, we're talking with Bradley Schaufenbuel. Brad is currently the Director of Information Security at Midland States Bank and held security leadership positions at many leading financial institutions.
In this episode, Jeff Williams interviews Alex Hutton, the director of information security at Too Big to Fail Bank. Alex was previously employed by Verizon, where he worked on modeling risk and contributing to the Verizon data breach report.
In this episode, Jeff Williams interviews Wayne Jackson of Sonatype. They discuss the results from The 2014 Open Source Development Survey, where developers gave their honest opinions on everything from third-party code to internal policies and procedures.
In this episode, Jeff Williams interviews Andrew Hay of Open DNS. They discuss bad credential management and the recent eBay breach, thinking with the mind of an attacker, firewalls and security in the cloud.
In this episode, Jeff Williams interviews Bruce Brody of Cubic Cyber Solutions, a leading provider of specialized systems and services in the rapidly changing world of technology.
In this episode, Jeff Williams interviews Jonathan Chow and Neeta Maniar of Live Nation Entertainment: The world's leading producer and promoter of live entertainment, and the parent company of Ticket Master and The House of Blues.