By Jeff Williams, Co-Founder, Chief Technology Officer
March 7, 2014
Once you discover a vulnerability, it instantly is super-critical information. How do you protect security vulnerabilities inside your organization? How are they stored? Who gets access? This What are people allowed to do with them? I've seen many organizations that pass them around via email. Sometimes in calendar entries. Sometimes on file systems, in Excel documents, and in web-based risk tracking applications.
At Contrast, we treat vulnerabilities as the most sensitive kind of information you can imagine.
Having a vulnerability is similar to having a password – it's the key to all the information in the application. You can use Contrast as a SAAS or On-Premises. But either way, you want some strong security around your vulnerabilities. We couldn't take security more seriously.
To that end, we based Contrast Security on 6 pillars of application security, namely:
We envision a world where we can trust software with the most important activities of humanity. We love software, and it hurts us to see it misused to cause harm to others. Contrast Security is committed to the highest standards of application and network security for Contrast. We secure our infrastructure, ensure data is always protected, minimize impact on developers, practice rugged software development, and carefully verify our code. At the core of our security is a commitment to transparency – across our protections, processes, and even potential problems. Those are the pillars on which we stand. And we plan on standing until we can trust software with the most important activities of humanity.
Perhaps, all it takes is rethinking your existing program and moving to one that leverages a continuous application security (CAS) approach. Organizations practicing CAS quickly determine how a new risk affects them, design a defense strategy, and measure their progress to 100% coverage. By implementing eight functions within an enterprise you can assemble an effective application security program.
Jeff brings more than 20 years of security leadership experience as co-founder and Chief Technology Officer of Contrast Security. He recently authored the DZone DevSecOps, IAST, and RASP refcards and speaks frequently at conferences including JavaOne (Java Rockstar), BlackHat, QCon, RSA, OWASP, Velocity, and PivotalOne. Jeff is also a founder and major contributor to OWASP, where he served as Global Chairman for 9 years, and created the OWASP Top 10, OWASP Enterprise Security API, OWASP Application Security Verification Standard, XSS Prevention Cheat Sheet, and many more popular open source projects. Jeff has a BA from Virginia, an MA from George Mason, and a JD from Georgetown.
Get the latest content from Contrast directly to your mailbox. By subscribing, you will stay up to date with all the latest and greatest from Contrast.