Skip to content

Jeff Williams, Co-Founder, Chief Technology Officer

Jeff brings more than 20 years of security leadership experience as co-founder and Chief Technology Officer of Contrast Security. He recently authored the DZone DevSecOps, IAST, and RASP refcards and speaks frequently at conferences including JavaOne (Java Rockstar), BlackHat, QCon, RSA, OWASP, Velocity, and PivotalOne. Jeff is also a founder and major contributor to OWASP, where he served as Global Chairman for 9 years, and created the OWASP Top 10, OWASP Enterprise Security API, OWASP Application Security Verification Standard, XSS Prevention Cheat Sheet, and many more popular open source projects. Jeff has a BA from Virginia, an MA from George Mason, and a JD from Georgetown.

Subscribe Now
    Topics
    Don’t Panic: Insecure Libraries Are Not the Apocalypse

    Don’t Panic: Insecure Libraries Are Not the Apocalypse

    The use of open source software has more than doubled from 6 billion to 13 billion component downloads per year. It’s..

    Resolve the Alarming Application Security Attitudes Exposed in Survey

    Resolve the Alarming Application Security Attitudes Exposed in Survey

    This week, the fourth annual Open Source Development and Application Security Survey was released. The 3,353 software..

    Interview: Wayne Jackson of Sonatype

    Interview: Wayne Jackson of Sonatype

    In this interview, Jeff Williams interviews Wayne Jackson of Sonatype. They discuss the results from The 2014 Open..

    Getting Left of Boom: Using FireEye and Contrast Together

    Getting Left of Boom: Using FireEye and Contrast Together

    The term "Left of Boom" is a military term used to describe the time before the explosion of an improvised explosive..

    Interview: Andrew Hay of Open DNS

    Interview: Andrew Hay of Open DNS

    In this interview, Jeff Williams interviews Andrew Hay of Open DNS. They discuss bad credential management and the..

    Interview: Bruce Brody of Cubic Cyber Solutions

    Interview: Bruce Brody of Cubic Cyber Solutions

    In this interview, Jeff Williams interviews Bruce Brody of Cubic Cyber Solutions, a leading provider of specialized..

    Interview: Jonathan Chow & Neeta Maniar of Live Nation Entertainment

    Interview: Jonathan Chow & Neeta Maniar of Live Nation Entertainment

    In this interview, Jeff Williams interviews Jonathan Chow and Neeta Maniar of Live Nation Entertainment: The world's..

    Interactive Application Security: Frequently Asked Questions

    Interactive Application Security: Frequently Asked Questions

    Contrast doesn't neatly fall into either the static analysis (SAST) or dynamic analysis (DAST) categories most security..

    We've Been Hacked. Our Data Was Breached. What Do I Do Now?

    We've Been Hacked. Our Data Was Breached. What Do I Do Now?

    We're Sorry You Got Hacked. First, if you just detected a data breach, you've been hacked, and you should probably stop..