Personal Information
Entreprise/Lieu de travail
Baltimore, Maryland Area United States
Profession
Application Security Expert
Secteur d’activité
Technology / Software / Internet
Site Web
http://www.contrastsecurity.com
À propos
For over 25 years, my passion has been improving the security of the world's software. I've founded three very different but highly successful organizations to help solve the problem.
At Contrast, we invented a revolutionary technique that turns ordinary applications into "self protecting software." Contrast infuses new security capabilities into applications at runtime using dynamic binary instrumentation. Contrast installs in seconds, and from that point forward, applications continuously detect their own vulnerabilities *and* protect themselves against attacks. In practice, it works like an AppDynamics or New Relic, but for security not performance.
I've spent my career working secur...
Mots-clés
iast
owasp
rasp
appsec
dast
waf
sast
application security
devops
devsecops
security
vulnerability
clickjacking
agile
sql injection
csrf
xss
Tout plus
Présentations
(4)J’aime
(3)Turning security into code by Jeff Williams
DevSecCon
•
il y a 6 ans
Continuous Application Security at Scale with IAST and RASP -- Transforming DevOps into DevSecOps
Jeff Williams
•
il y a 7 ans
Don't Judge a Website by its Icon - Read the Label!
Dinis Cruz
•
il y a 11 ans
Personal Information
Entreprise/Lieu de travail
Baltimore, Maryland Area United States
Profession
Application Security Expert
Secteur d’activité
Technology / Software / Internet
Site Web
http://www.contrastsecurity.com
À propos
For over 25 years, my passion has been improving the security of the world's software. I've founded three very different but highly successful organizations to help solve the problem.
At Contrast, we invented a revolutionary technique that turns ordinary applications into "self protecting software." Contrast infuses new security capabilities into applications at runtime using dynamic binary instrumentation. Contrast installs in seconds, and from that point forward, applications continuously detect their own vulnerabilities *and* protect themselves against attacks. In practice, it works like an AppDynamics or New Relic, but for security not performance.
I've spent my career working secur...
Mots-clés
iast
owasp
rasp
appsec
dast
waf
sast
application security
devops
devsecops
security
vulnerability
clickjacking
agile
sql injection
csrf
xss
Tout plus