A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans Frank Catucci and Dan Murphy, AppSec Serialized by Invicti puts a new spin on the ”two guys talking” format by starting each episode with a security-themed fiction story in the style of old-time radio shows. Each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a sol ...
…
continue reading
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizations of all sizes with their cybersecurity needs. If you’re an AppSec professional looking for an opportunity to work with some of the best in the ...
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
…
continue reading
AppSec Builders features practical and actionable conversations with application security experts and practitioners. Topics range from understanding and solving classes of vulnerability, building protections to efficiently scale with your business, and core best practices to strengthen your security posture. AppSec Builders is hosted by Jb Aviat, AppSec staff engineer at Datadog, former CTO and co-founder at Sqreen and Apple Red Team member. Contact us at appsecbuilders@datadoghq.com
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
The Future of Application Security is a podcast for ambitious leaders who want to build a modern and effective AppSec program. Doing application security right is really hard and we want to help other experts build the future of AppSec by curating the best industry insights, tips and resources. What’s the most important security metric to measure in 2024? It’s Mean Time to Remediate (MTTR). Download our new MTTR guide: https://lnkd.in/evjcf4Vt
…
continue reading
Working in cybersecurity can lead to many restless nights worrying about the safety of your applications. But don’t let software insecurity get you down – we’re here to help you take back your sleep. World-renowned software security evangelists will join our Checkmarx experts Stephen Gates and Matt Slotten to get inside the minds of cyber attackers. Our conversations will be packed with insight into the latest software threats and best practices for maturing your application security program ...
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
Cybersecurity. InfoSec. DevSecOps. AppSec. Should companies be talking about these subjects only when they become too large? NO! Should cybersecurity be a priority for every company, no matter the size? YES! According to a study by BullGuard study in 2020, 43% of SMB owners have no cybersecurity defense plan in place at all – leaving their most sensitive financial, customer and business data, and ultimately their companies, at significant risk. Many startup and SMB companies will admit that ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
VerSprite is a leader in risk-based cybersecurity services and PASTA threat modeling, enabling businesses to improve the protection of critical assets, ensure compliance, and manage risk. Our mission is to help you understand and improve your organization’s cybersecurity posture. With cyberattacks increasing in number and sophistication daily, it is essential to protect your organization’s assets, protect your clients, and maintain the same, excellent reputation and trust you have worked har ...
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Redefining Society and Technology Podcast | Musing On Society and Technology | Hosted by Marco Ciappelli | Let's face it: the future is now. We live in a Hybrid Analog Digital Society and it's time to stop ignoring the profound impact technology has on us. The line between the physical and virtual worlds is no longer real—it's a figment of our imagination. We're constantly juggling convenience, privacy, freedom, security, and the very future of humanity in a precarious balancing act. There’s ...
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Welcome to The AI Native Developer, hosted by Guy Podjarny and Simon Maple. Join us as we explore and help shape the future of software development through the lens of AI. In this new paradigm of AI Native Software Development, we delve into how AI is transforming the way we build software, from tools and practices to the very structure of development teams. Our target audience includes developers and development leaders eager to stay ahead of the curve. If you're passionate about the future ...
…
continue reading
A technology focused podcast - Talks about the business, people, technology, products, culture of silicon valley - with a security twist.
…
continue reading
Featuring guests from around the world and builders of some of the most exciting technologies on earth, join us as we explore the world of innovation and technology and what we need to do as engineers to keep it safe and secure.
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
1
Canadian Cybersecurity, Open Source Risks, and AppSec Insights with Tanya Janca
35:18
35:18
Play later
Play later
Lists
Like
Liked
35:18
🎙️ Tune in to the latest #CryingOutCloud episode featuring Tanya Janca, where we dive into all things cloud!Join Eden and Amitai as they welcome Tanya Janca, founder of 'We Hack Purple', and the author of 'Alice and Bob Learn Application Security'. She's seen it all—from launching AppSec programs to teaching secure coding and leading on education a…
…
continue reading
Seth (@sethlaw) and Ken (@cktricky) return for an in-depth discussion on penetration testing expectations, driven by recent posts and slack activity from Andrew Wilson. Essentially, certain clients expect that a single penetration test finds everything possible, whether or not those expectations are appropriate. The duo expounds on their experience…
…
continue reading
1
What Existing AWS Services are Important to AppSec? (Part 1 of 2) | The AppSec Insiders Ep.14
26:00
26:00
Play later
Play later
Lists
Like
Liked
26:00
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizati…
…
continue reading
In Episode 07 of Secrets of AppSec Champions, PenTesting with Nat Shere, Chris Lindsey hosts seasoned penetration tester Nathaniel Shere, who currently serves as the Technical Services Director at Craft Compliance. Nathaniel shares his journey into penetration testing, starting from his master's in cybersecurity and leading to over a decade of expe…
…
continue reading
Welcome to another episode of The Dirty South Cybersecurity Podcast! 🎙️ In this episode, your hosts Tony and Q0PHI dive deep into the world of Application Security (AppSec). They tackle the burning question: Is AppSec dead? 🤔 Join the discussion as they explore the rise of Application Security Posture Management (ASPM) and debate whether ASPM is th…
…
continue reading
1
Machine Learning When the Perimeter is Burning
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45
Knowing what sites, apps, and APIs you’re exposing to the Internet is crucial for determining your realistic risk level and making accurate security decisions. In this episode, Frank Catucci and Dan Murphy are joined by special guest Bogdan Calin, Principal Security Researcher at Invicti, to talk about ways of determining an organization’s web atta…
…
continue reading
1
Does AI threaten the open web? Challenges and Opportunities with Netlify's CEO & Co-Founder, Matt Biillmann
55:27
55:27
Play later
Play later
Lists
Like
Liked
55:27
In this episode of the AI Native Dev podcast, host Guy Podjarny welcomes Matt Biilmann, CEO and co-founder of Netlify, to explore the profound impact of AI on web development. Matt shares his journey from a music editor to a leading figure in web infrastructure, offering a unique perspective on AI-driven innovation. The conversation covers a range …
…
continue reading
1
Securing the API Frontier: Insights from Anand Rai on Modern Cybersecurity Challenges
40:12
40:12
Play later
Play later
Lists
Like
Liked
40:12
Episode Summary In this episode, Cole Cornford speaks with Anand, an API security expert at Traceable AI with over 18 years of experience in crafting innovative IT solutions. Anand's expertise spans API design, microservices architecture, cloud technologies like Kubernetes and AWS, and security architecture including IAM and OAuth. Together, they d…
…
continue reading
1
The Art of Throwing the (Calculated) Cybersecurity Hail Mary
33:14
33:14
Play later
Play later
Lists
Like
Liked
33:14
In this episode, Jeffrey talks to Mel Reyes, CEO of Elite Technical Concierge. Mel’s background is deep, with expertise in helping organizations build successful security programs with limited resources. He also heads a nonprofit organization, Fellowship of Digital Guardians that seeks to elevate awareness of IT, cybersecurity and compliance domain…
…
continue reading
1
Total Recall? LLM finds bug in SQLite, C++ safety failures, zero time for zero privs - ASW #306
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29
Microsoft delays Recall AGAIN, Project Zero uses an LLM to find a bugger underflow in SQLite, the scourge of infostealer malware, zero standing privileges is easy if you have unlimited time (but no one does), reverse engineering Nintendo's Alarmo and RedBox's... boxes. Bonus: the book series mentioned in this episode The Lost Fleet by Jack Campbell…
…
continue reading
1
Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306
1:05:35
1:05:35
Play later
Play later
Lists
Like
Liked
1:05:35
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
…
continue reading
1
Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
…
continue reading
1
Live Roundup: Embracing AI in Development and Infrastructure, with Liran Tal, Amara Graham, Armon Dadgar and Patrick Debois
48:16
48:16
Play later
Play later
Lists
Like
Liked
48:16
In this episode of the AI Native Dev podcast, hosts Simon Maple and Guy Podjarny discuss the transformative role of AI in development and infrastructure. Featuring guests Liran Tal from Snyk, Armon Dadgar from HashiCorp, DevOps pioneer Patrick Debois, and Amara Graham from Camunda, the conversation covers AI code assistants, security in AI-generate…
…
continue reading
1
Cybersecurity as a Proactive Societal Safeguard? How Cybersecurity Shapes Society and Technology — and Vice Versa — and The Other Way Around! | A Conversation with Sean Martin and Fred Heiding | Redefining ...
40:19
40:19
Play later
Play later
Lists
Like
Liked
40:19
Guests: Fred Heiding, Computer Security Specialist, World Economic Forum [@wef] On LinkedIn | https://www.linkedin.com/in/fheiding/ On Twitter | https://twitter.com/fredheiding On Mastodon | https://mastodon.social/@fredheiding On Instagram | https://www.instagram.com/fheiding/ Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Red…
…
continue reading
1
ep2024-10 Don't be Scared, It's just a Pen Test with Brad Causey
37:19
37:19
Play later
Play later
Lists
Like
Liked
37:19
There's no reason to be scared about a pen test - especially when it's run by a professional like Brad Causey. I catch up with Brad in this episode to discuss what's recently changed in pen testing in how you test and people's motivations for hiring a pen testing. Interesting and not spooky at all.Show Links:Brad on LinkedIn- https://www.linkedin.c…
…
continue reading
1
What the Military’s “Elegant and Brutal” Model Can Teach Us About Cybersecurity
30:58
30:58
Play later
Play later
Lists
Like
Liked
30:58
In this episode, Jeffrey talks to Cindy Seipert, an InfoSec GRC analyst at Health Catalyst. They discuss movies that challenge our identity, Cindy’s unique career path from the military to the tech industry and her experiences as a woman in cybersecurity.By Jeffrey Wheatman
…
continue reading
1
What Existing AWS Services are Important to AppSec? (Part 2 of 2) | The AppSec Insiders Ep.15
33:28
33:28
Play later
Play later
Lists
Like
Liked
33:28
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizati…
…
continue reading
1
Protecting Identity of AI Agents & Standardizing Identity Security for SaaS Apps - Shiven Ramji, Arnab Bose - ASW #305
30:42
30:42
Play later
Play later
Lists
Like
Liked
30:42
Generative AI has been the talk of the technology industry for the past 18+ months. Companies are seeing its value, so generative AI budgets are growing. With more and more AI agents expected in the coming years, it’s essential that we are securing how consumers interact with generative AI agents and how developers build AI agents into their apps. …
…
continue reading
Scott Norberg joins Ken Johnson and Seth Law for an episode of Absolute AppSec all about SAST. Scott is an ASP.NET Security Consultant, Author, Researcher and Speaker. In addition to running his Opperis Technologies consultancy, Scott has recently begun working as lead application security architect at CDW. Before that he worked as Lead Application…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - ASW #305
53:04
53:04
Play later
Play later
Lists
Like
Liked
53:04
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Show Notes: https://securityweek…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
1:22:48
1:22:48
Play later
Play later
Lists
Like
Liked
1:22:48
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
…
continue reading
1
Hybrid Cloud Attacks, Linux Malware, and LLMJacking Exposed
18:52
18:52
Play later
Play later
Lists
Like
Liked
18:52
🎙️ Ready for the latest on Hybrid Cloud Attacks, Linux Malware, and LLMJacking? Join our hosts Eden Koby Naftali and Amitai Cohen in our NEW #CryingOutCloud episode.In this episode:📌 The perfctl malware campaign—stealthily mining crypto on thousands of Linux machines undetected for years 📌 Storm-0501 hybrid cloud attacks, targeting everything from …
…
continue reading
Kayra Otaner joins the podcast today to discuss DevSecOps and answer the question, is it dead? Kayra is the Director of DevSecOps at Roche and is highly involved in the DevSecOps community. Kayra states that DevSecOps in its traditional form is “dead” and that each organization should approach its needs based on their size. Otaner introduces the co…
…
continue reading
1
Changing the Developer Documentation UX Workflow using AI with Amara Graham
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38
Join us for an insightful discussion with Amara Graham, a leader in developer experience at Camunda, as she delves into the transformative impact of AI on developer documentation. With her extensive background in developer relations and advocacy, Amara shares her journey and the innovative strategies employed at Camunda to integrate AI into documen…
…
continue reading
Join Tony UV and Q0PHI80 at Black Hat 2024 as they discuss these 5 key topics: 1) Crowdstrike Incident - Security Issue, Incident or Neither? 2) QA Testing Today - For Better or for Worse? 3)Geopolitics in the Role of Cybercrime- Forgotten X-Factor or Integrated Background Influence? 4)Automated Pen Testing- Fact or Fiction for the Future? 5) Role …
…
continue reading
1
Secure Robotics: Exploring Safety, Trust, and Cybersecurity with Prof. Damith Herath and Adam Haskard
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10
Episode Summary In this episode, Cole Cornford speaks to two guests on the topic of robotics: Damith Herath, a Professor at the University of Canberra, and Adam Haskard, co-founder and Director of Bluerydge, a Canberra-based cybersecurity and technology firm. Together, Damith and Adam are conducting research into Secure Robotics, an emerging field …
…
continue reading
In this episode, Jeffrey talks with Keren de Via, Go-to-Market Director at Cyturus Technologies. Keren has a deep cybersecurity background and was the first female Combat Communications and Cyber Defense Officer in the Israel Defense Forces. They discuss movies where a character experiences a perspective-shifting transformation, Keren’s transition …
…
continue reading
1
François Proulx - Arbitrary Code Execution 0-day in Build Pipeline of Popular Open Source Packages
45:31
45:31
Play later
Play later
Lists
Like
Liked
45:31
François Proulx shares his discovery of security vulnerabilities in build pipelines. Francois has found that attackers can exploit this often overlooked side of the software supply chain. To help address this, his team developed an open source scanner called Poutine that can identify vulnerable build pipelines at scale and provide remediation guida…
…
continue reading
1
JSON Parsing, Email Parsing, CISA's Bad Practices Guide, Abusing Disclosure Policies - ASW #304
38:34
38:34
Play later
Play later
Lists
Like
Liked
38:34
Flaws that arise from inconsistent parsing of JSON and email addresses, CISA's guide to bad software practices, abusing a security disclosure process to take over a WordPress plugin, and more! Show Notes: https://securityweekly.com/asw-304
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
38:53
38:53
Play later
Play later
Lists
Like
Liked
38:53
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
1
From DevOps to AI: Patrick Debois Shares Strategies for Successful AI Integration and Cultural Change
30:00
30:00
Play later
Play later
Lists
Like
Liked
30:00
Join host Guy Podjarny as he sits down with Patrick Debois, known as the "father of DevOps", to discuss the rapidly evolving landscape of AI Native Development. With over two decades of experience in IT, Patrick offers a unique perspective on the parallels between AI and DevOps, emphasizing the need for integration and cultural change. In this insi…
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
1:17:25
1:17:25
Play later
Play later
Lists
Like
Liked
1:17:25
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
Jeremy Long (@ctxt on social media), Principal Security Engineer at Service Now and project founder and lead for the OWASP Dependency Check project joins Ken Johnson (@cktricky) and Seth Law (@sethlaw). Jeremy spent a decade and a half as a lead application security engineer and principal engineer at Wells Fargo before joining ServiceNow. He has sp…
…
continue reading
1
What Better Time Than Now? (And Other Considerations for Aspiring Security Professionals)
28:28
28:28
Play later
Play later
Lists
Like
Liked
28:28
In this episode, Jeffrey talks to Tanara Burke-Lloyd, SOC Analyst at Littler, the largest global employment and labor law practice. They discuss “fish out of water” movies, her inspiring journey into cybersecurity and the importance of mentorship, documentation and understanding the actual problems in cybersecurity.…
…
continue reading
1
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303
42:00
42:00
Play later
Play later
Lists
Like
Liked
42:00
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsoft's small steps towards secure design, and more! Show Notes: https://securityweekly.com/asw-303
…
continue reading