Jeff Williams

4.3K posts

Jeff Williams banner
Jeff Williams

Jeff Williams

@planetlevel

Contrast Security Founder & CTO Streamlining appsec with runtime security https://t.co/oGdQaQ6o6Y he/him

Maryland Entrou em Ekim 2007
356 Seguindo3.1K Seguidores
Jeff Williams retweetou
Contrast Security
Contrast Security@contrastsec·
Join us on August 14 to learn why existing approaches to application security fall short, and how #DevOps principles can improve #AppSec practices. Register here: bit.ly/4fVNahF
Contrast Security tweet media
English
0
2
6
356
Jeff Williams retweetou
Founders Circle Capital
Founders Circle Capital@FoundersCC·
Congratulations to @cribl_io, @contrastsec, and @druvainc for being recognized in the @Gartner_inc Peer Insights Customers' Choice 2023👏 ✨Cribl - Voice of the Customer for Event Stream Processing cribl.io/news/cribl-amo… ✨Contrast Security - Voice of the Customer for AppSec Testing contrastsecurity.com/gartner-voice-… ✨Druva - Only Customers’ Choice for Disaster Recovery as a Service druva.com/blog/druva-2x-… #gartner #gartnerpeerinsights
Founders Circle Capital tweet media
English
1
2
3
326
zee67
zee67@IAMZee67·
@contrastsec @planetlevel I would add WAF as the first line defense before bad payload gets to the application. Once the payload gets to the Server then yes RunTime can do its thing.
English
1
0
0
26
Contrast Security
Contrast Security@contrastsec·
Learn how our financial technology customer improved their application security by implementing #RuntimeProtection, which detects and blocks attacks in real-time. Watch our co-founder and CTO @planetlevel's conversation with Derek Fisher to see how they did it. #AppSec
English
1
5
0
145
Jeff Williams retweetou
Contrast Security
Contrast Security@contrastsec·
We are excited to announce that our Secure Code Platform has been recognized by our customers in the 2023 #Gartner Peer Insights' Voice of the Customer for Application Security Testing! See why we received a 4.7/5 rating & a 94% willingness to recommend: contrastsecurity.com/gartner-voice-…
Contrast Security tweet media
English
1
8
1
257
Jeff Williams
Jeff Williams@planetlevel·
@ddccffvv Agree! For most things, B is the most cost-effective approach. There are a few things that are pretty accurate early and can be found with SAST/SCA. But for most vulnerabilities, waiting a few minutes for IAST testing and full context from a fully assembled, running app is best.
English
0
0
1
34
Stijn Muylle
Stijn Muylle@ddccffvv·
However, if you tell me I can only pick one scenario, I'm going with B (shift left be damned!). I'm fixing actual issues late, instead of hoping I've fixed everything early. Not even hesitating.
English
1
0
1
20
Stijn Muylle
Stijn Muylle@ddccffvv·
Who is a sucker for devsec / appsec resources? 🙋‍♂️
Stijn Muylle tweet media
English
1
0
2
355
Jeff Williams
Jeff Williams@planetlevel·
@ddccffvv Over 62% of open source libraries are completely inactive - never even load into memory. Of code that does run, over 2/3 is custom code… just 1/3 is libraries. And when a library has a vulnerability, exploitation is *possible* only 10% of the time.
English
0
1
1
19
Stijn Muylle
Stijn Muylle@ddccffvv·
citation for the exploitability of CVE's number. Can't find the statistic for usage of vulnerable code in libraries, but it's something @planetlevel talked about.
English
2
0
0
28
Jeff Williams
Jeff Williams@planetlevel·
@ddccffvv In modern pipelines, A and B are only minutes apart. So it's not worth it to shift that far left and lose ALL the context of the running app/API. Wait a few minutes, and get a much smaller list.
English
1
0
2
18
Stijn Muylle
Stijn Muylle@ddccffvv·
@planetlevel Scenario B is then an opportunity to get to the root cause. The best goal here might not be a "quick time to fix", but answering the question: "why did we not catch this issue earlier?"
English
3
0
0
32
Jeff Williams
Jeff Williams@planetlevel·
@ddccffvv I don't see why Scenario B items are "bigger" -- they're the same issues as in Scenario A, but true positives. You *could* fix a root cause, and eliminate a whole bunch of them at a time, but that's different.
English
0
0
1
19
Jeff Williams
Jeff Williams@planetlevel·
@stevespringett Except that even heavyweight SAST isn’t accurate enough. Lightweight SAST is kind of a joke. If it’s fast, it’s trash :-) And if it’s slow you can’t integrate into workflows. Especially if you include triage. Try IAST if you want fast and accurate during workflows.
English
0
0
1
60