Skip to content

Jeff Williams, Co-Founder, Chief Technology Officer

Jeff brings more than 20 years of security leadership experience as co-founder and Chief Technology Officer of Contrast Security. He recently authored the DZone DevSecOps, IAST, and RASP refcards and speaks frequently at conferences including JavaOne (Java Rockstar), BlackHat, QCon, RSA, OWASP, Velocity, and PivotalOne. Jeff is also a founder and major contributor to OWASP, where he served as Global Chairman for 9 years, and created the OWASP Top 10, OWASP Enterprise Security API, OWASP Application Security Verification Standard, XSS Prevention Cheat Sheet, and many more popular open source projects. Jeff has a BA from Virginia, an MA from George Mason, and a JD from Georgetown.

Subscribe Now
Trust ‘zero trust’ for Application Security

Trust ‘zero trust’ for Application Security

The perimeter cybersecurity model is like the defensive walls that surround ancient cities. For thousands of years,..

Legal liability for insecure software might work, but it's dangerous

Legal liability for insecure software might work, but it's dangerous

Ensuring security in the software market is undeniably crucial, but it is important to strike a balance that avoids..

Cybersecurity Insights with Contrast Co-founder and CTO Jeff Williams | 11/18

Cybersecurity Insights with Contrast Co-founder and CTO Jeff Williams | 11/18

Insight #1 " Feds continue to push aggressive timelines for requiring app/API security “attestations” from software..

Building a modern API security strategy — API protection

Building a modern API security strategy — API protection

Part four of the five-part series, Building a modern API security strategy.

Building a modern API security strategy — API components

Building a modern API security strategy — API components

Part three of the five-part series, Building a modern API security strategy.

Building a modern API security strategy — API testing

Building a modern API security strategy — API testing

Part two of the five-part series, Building a modern API security strategy.

Building a modern API security strategy — API inventory

Building a modern API security strategy — API inventory

Part one of the five-part series, Building a modern API security strategy.

Building a modern API security strategy: A five-part series — Overview

Building a modern API security strategy: A five-part series — Overview

The Spring4Shell exploit was, really, quite elegant.

Feeble APIs = Feeble app security

Feeble APIs = Feeble app security

Your apps are only as secure as each one of your scores of APIs.