Application Security
,
Artificial Intelligence & Machine Learning
,
Events
Contrast Security CTO Jeff Williams on How Attackers Exploit AI Code Generation
Development teams now generate code faster using artificial intelligence-driven tools. But with speed comes risk – massive volumes of code are moving to production, overwhelming security teams. At the same time, threat actors are using AI to generate attacks with little technical skill. “It is lowering the bar and expanding the population of attackers,” said Jeff Williams, co-founder and CTO of Contrast Security.
See Also: Securing BYOD Without Sacrificing Privacy
These twin dynamics demand a new strategy. Traditional approaches that rely on static code analysis miss the broader picture and can’t distinguish which vulnerabilities pose real danger. He said the key lies in analyzing applications during runtime – where real users, data and integrations come together.
“One of the things that we’re bringing to the market is bringing that runtime context into development so you can make smart decisions, and it lowers the noise, focusing on things that are really critical,” Williams said.
In this video interview with Information Security Media Group at Gartner Security & Risk Management Summit, Williams also discussed:
- Why uniting development, security and operations under a shared application graph is essential;
- How application-layer graphs improve AI’s role in fixing vulnerabilities;
- Why separating AppSec and SecOps leads to inefficiencies.
Williams has more than 25 years of experience in business development, application security, SDLC, pen testing, cybersecurity, information security, IT, OWASP and cloud computing. As the CTO of Contrast Security, he helps developers accelerate software delivery and improve security by providing a full suite of modern application security products at the speed and scale of DevOps.