Personal Information
Unternehmen/Arbeitsplatz
Baltimore, Maryland Area United States
Beruf
Application Security Expert
Branche
Technology / Software / Internet
Webseite
http://www.contrastsecurity.com
Info
For over 25 years, my passion has been improving the security of the world's software. I've founded three very different but highly successful organizations to help solve the problem.
At Contrast, we invented a revolutionary technique that turns ordinary applications into "self protecting software." Contrast infuses new security capabilities into applications at runtime using dynamic binary instrumentation. Contrast installs in seconds, and from that point forward, applications continuously detect their own vulnerabilities *and* protect themselves against attacks. In practice, it works like an AppDynamics or New Relic, but for security not performance.
I've spent my career working secur...
Tags
iast
owasp
rasp
appsec
dast
waf
sast
application security
devops
devsecops
security
vulnerability
clickjacking
agile
sql injection
csrf
xss
Mehr anzeigen
Präsentationen
(4)Gefällt mir
(3)Turning security into code by Jeff Williams
DevSecCon
•
Vor 6 Jahren
Continuous Application Security at Scale with IAST and RASP -- Transforming DevOps into DevSecOps
Jeff Williams
•
Vor 7 Jahren
Don't Judge a Website by its Icon - Read the Label!
Dinis Cruz
•
Vor 11 Jahren
Personal Information
Unternehmen/Arbeitsplatz
Baltimore, Maryland Area United States
Beruf
Application Security Expert
Branche
Technology / Software / Internet
Webseite
http://www.contrastsecurity.com
Info
For over 25 years, my passion has been improving the security of the world's software. I've founded three very different but highly successful organizations to help solve the problem.
At Contrast, we invented a revolutionary technique that turns ordinary applications into "self protecting software." Contrast infuses new security capabilities into applications at runtime using dynamic binary instrumentation. Contrast installs in seconds, and from that point forward, applications continuously detect their own vulnerabilities *and* protect themselves against attacks. In practice, it works like an AppDynamics or New Relic, but for security not performance.
I've spent my career working secur...
Tags
iast
owasp
rasp
appsec
dast
waf
sast
application security
devops
devsecops
security
vulnerability
clickjacking
agile
sql injection
csrf
xss
Mehr anzeigen