<iframe src="//www.googletagmanager.com/ns.html?id=GTM-WQV6DT" height="0" width="0" style="display:none;visibility:hidden">

Thought Leaders

Insights from a CISO: Compliance & Application Security

Christine Carrig, Director of Marketing | September 15, 2016

Contrast interviews folks who are "Security Influencer's" and then shares their knowledge via online media. We see Security Influencers as thought leaders and security experts who provide real-world insight and “in-the-trenches” experience on..

Read More

Hacked- Thought Leaders

60 Minutes & the "Signaling System Seven (SS7) Vulnerability"

Jeff Williams, Co-Founder, Chief Technology Officer | September 7, 2016

Over the weekend, 60 Minutes featured a segment on how cellphones and mobile phone networks are vulnerable to hacking, exploiting a security flaw discovered in Signaling System Seven – or SS7. According to security researcher Karsten Nohl, “the..

Read More

Thought Leaders

Insecure Code: TechBeacon Talks Dangerous Code & Programming Missteps

Christine Carrig, Director of Marketing | September 1, 2016

This week, Erik Sherman of TechBeacon mentioned Jeff Williams, Contast Security CTO and Co-Founder, in an article on the consequences of insecure code "21 Dangerous Pieces of Code and Programming Mishaps". He points out that software is powerful..

Read More

Thought Leaders

The Most Important Elements of Data & Application Security

Mark Hodgson, Vice President of Marketing | August 29, 2016

DZone recently interviewed 19 application and data security executives to gather insights and trends and business practices. Jeff Williasms, Contrast Security CTO and Co-Founder was interviewed to provide his observations.

Read More

Thought Leaders

My Top 5 Cyber Security Predictions for 2016

Jeff Williams, Co-Founder, Chief Technology Officer | December 7, 2015

It's that time of year for my top predictions for 2016.  And, let's review how well I did for 2015:

My 2016 predictions include:

  1. We will see a major attack that takes advantage of our totally unprotected development infrastructure.
  2. We will..
Read More

Thought Leaders

Interview: Jacob West, Chief Architect for Security Products at Netsuite

Jeff Williams, Co-Founder, Chief Technology Officer | May 13, 2015

Thanks, everyone, for joining us on the Security Influencers Channel. We ask industry thought leaders to share their experiences and ideas about security in the future. We're hosting a series of brief and highly informative interviews with..

Read More

Thought Leaders

Interview: Casey Fleming, Chairman & CEO of BLACKOPS Partners

Jeff Williams, Co-Founder, Chief Technology Officer | March 26, 2015

 

Thanks, everyone, for joining us on the Security Influencers Channel. We're hosting a series of brief and highly informative interviews with influential security leaders and in 2015, we're talking about the implications of rapid software..

Read More

Thought Leaders

Interview: Doug Depeppe of Eoesedge Legal, Cyberlaw and Services

Jeff Williams, Co-Founder, Chief Technology Officer | March 12, 2015

Thanks, everyone, for joining us on the Security Influencers Channel. We're hosting a series of brief and highly informative interviews with influential security leaders and in 2015, we're talking about the implications of rapid software..

Read More

Thought Leaders

Interview: Ed Alcantara, CSO of Darknet BlackOps Intelligence

Jeff Williams, Co-Founder, Chief Technology Officer | February 25, 2015

Thanks, everyone, for joining us on the Security Influencers Channel. We're hosting a series of brief and highly informative interviews with influential security leaders and in 2015, we're talking about the implications of rapid software..

Read More

Thought Leaders

Interview: Stuart McClure, CEO of Cylance, Inc.

Jeff Williams, Co-Founder, Chief Technology Officer | February 11, 2015

Thanks, everyone, for joining us on the Security Influencers Channel. We're hosting a series of brief and highly informative interviews with influential security leaders and in 2015, we're talking about the implications of rapid software..

Read More

Get Blog Email Notifications

continuous-application-security