DZone
Security Zone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
  • Refcardz
  • Trend Reports
  • Webinars
  • Zones
  • |
    • Agile
    • AI
    • Big Data
    • Cloud
    • Database
    • DevOps
    • Integration
    • IoT
    • Java
    • Microservices
    • Open Source
    • Performance
    • Security
    • Web Dev
DZone > Security Zone > Automating AppSec with Contrast Security

Automating AppSec with Contrast Security

Jeff Williams, Co-founder and CTO of Contrast Security and Steve Wilson, CPO, talk about the importance of modernizing application security

Dan Lines user avatar by
Dan Lines
CORE ·
Dec. 09, 21 · Security Zone · Interview
Like (4)
Save
Tweet
3.82K Views

Join the DZone community and get the full member experience.

Join For Free

Everything we do is online. We bank online, access healthcare, pay our taxes, build our businesses -  and along the way we put trust in companies to keep us protected.

Unfortunately, companies aren’t great at writing secure software. Contrast Security wants to change that.

Jeff Williams, Co-founder & CTO of Contrast Security, and Steve Wilson, CPO, join the Dev Interrupted podcast to discuss the future of application security (AppSec), the importance of security automation and why the traditional way of doing security - where you scan app after app a few times a year - is over.

Episode Highlights Include:

  • By the numbers: the average application is attacked 13,000 times a month
    • And has over 35 vulnerabilities
  • The reasons AppSec should to be automated
  • How to reduce the cost of AppSec
  • Why shifting left doesn't result in more secure code


Join the Dev Interrupted Community

With over 2000 members, the Dev Interrupted Discord Community is the best place for Engineering Leaders to engage in daily conversation. No sales people allowed. Join the community >>


Application security

Published at DZone with permission of Dan Lines, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Privacy and the 7 Laws of Identity
  • What Is Cloud-Native Architecture?
  • 3 Pieces of Bad Advice on How to Keep Your IT Job
  • Take Control of Your Application Security

Comments

Security Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • MVB Program
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends:

DZone.com is powered by 

AnswerHub logo