In this episode of Resilient Cyber, I sit down with longtime industry AppSec leader and Founder/CTO of Contrast Security, Jeff Williams, along with Contrast Security’s Sr. Director of Product Security Naomi Buckwalter, to discuss all things Application Detection & Response (ADR), as well as the implications of AI-driven development.
Prefer to listen?
Please be sure to leaving a rating and review, it helps a ton.
Jeff and Naomi and I dove into a lot of excellent topics, including:
Jeff’s role as a longtime AppSec industry leader and the recent rise of the categorization “Application Detection & Response” (ADR), why it is catching on and where shift left went wrong.
For more of a deep dive on ADR, you can see my article, “How ADR Addresses Gaps in the Detection and Response Landscape”
How ADR may be more intuitive than some of the other AppSec acronym categories we’re used to.
Naomi’s perspective as someone with a focus on Product and background as a practitioner when it comes to pain points that emerge when it comes to how the industry has implemented “shift left”.
How the rise of application vulnerability exploitation as seen in reports such as DBIR and M-Trends has contributed to a shift to ADR and emphasis on runtime visibility and context.
How SOC/SIEM tools historically have missed visibility into the Application layer, and the impacts this has led to when it comes to incident response and effective risk mitigation.
The cultural shift of getting SOC teams more involved in App-level incidents and utilizing ADR metrics, tools and insights.
The rise of AI in terms of software development, with AI poised to produce up to 80% of code in the coming years and the impacts AI will have for better or worse on AppSec.
Contrast’s Software Under Siege Report and the insights associated with application probes, viable attacks and how organizations can take a threat-informed approach to defense.
The reality that WAF and EDR isn’t “good enough” when it comes to protecting the application layer and how attackers have increasingly figured out to bypass these controls amongst a lack of visibility defenders have of runtime production environments.









