show episodes
 
Learn how the top brands wow customers through production-first engineering. On this podcast you will find the tactics, methodologies, and metrics used to drive customer value by the engineering leaders actually doing it. Join Rookout CTO, Liran Haimovitch as he explores how customer-centric brands approach engineering to create a competitive advantage; with interviews covering topics such as automation, issue resolution, team structure, DevOps, and more.
  continue reading
 
The Amazon Seller Podcast is brought to you by 8-figure Amazon private label sellers who share the advanced selling strategies related to Amazon FBA. We got started with Retail Arbitrage, Online Arbitrage and now are full-time brand builders/private label sellers. Learn how to find private label products to sell, import by sea & air from China, how to launch your product on the Amazon marketplace, promote, use Amazon PPC and become successful with your own private label product. Join Andy Sl ...
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
The Common Creative - But Never Ordinary A podcast series with Paul Fairweather and Chris Meredith The worlds of business, home and play are all starved of creativity. From an early age, we’re taught how to analyse, critique and simplify but the tools for exploring, ideating and creating are assumed to be instinctive. The Common Creative is all about bringing creativity back into everyday life - understanding the essence of creativity and making creativity a common as a loaf of bread and as ...
  continue reading
 
Loading …
show series
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
שם פרק: אופטימיות חסרת גבולות: כוח מניע ביזמות בחלל תכונה יזמית מעוררת השראה היא היכולת להיות אופטימי ללא גבול, במיוחד כשמנווטים בעולם בלתי צפוי בדרך להצלחה. מידד פריינטא מגלם תכונה זו כיזם חלוץ בתחום החלל בישראל. מאז שנחשף ל"חיידק החלל" בתפקידו הראשון כסטודנט, הוא צלל לעולם היזמות בחלל ללא מבט לאחור. לפני 14 שנים, כשאחרים פקפקו, מידד זיהה את הפוטנ…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
סקרנות שהובילה לאימוץ שינויים: יונתן מטוס על ניווט בנופים תרבותיים ושיאים יזמיים בפרק אנו צוללים אל העולם הדינמי של היזמות עם יונתן מטוס, שמסעו חוצה יבשות ותרבויות. כיזם ומשקיע, סיפורו של יונתן מלא בעליות ומורדות עזים שמלווים הובלת חברות חדשניות וניווט בשווקים גלובליים. מהלחץ העמוק של ניהול שתי חברות במקביל ועד לחוויה המרגשת של הצטרפות לצוות האנדרו…
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
Looking at use cases and abuse cases of Microsoft's Recall feature, examples of hacking web APIs, CISA's secure design pledge, what we look for in CVEs, a nod to PHP's history, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-288…
  continue reading
 
Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and …
  continue reading
 
How to strengthen resilience as a founder? As I say every episode, entrepreneurship is often described as an emotional rollercoaster, oscillating between the highest highs and lowest lows. Alon Leibovich experienced this firsthand when his company BrandTotal was sued by Facebook, throwing him into a crucible of immense mental stress for nearly two …
  continue reading
 
With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it’s more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single S…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 18, 2023. We talk with Ben about the rewards, hazards, and fun of bug bounty programs. Then we find out different ways to build successful and welcoming communities. Show Notes: https://securityweekly.com/vault-asw-9…
  continue reading
 
Secure coding education should be more than a list of issues or repeating generic advice. Liran Tal explains his approach to teaching developers through examples that start with exploiting known vulns and end with discussions on possible fixes. Not only does this create a more engaging experience, but it also relies on code that looks familiar to d…
  continue reading
 
Journey of Courage: Balancing Entrepreneurship, Leadership and Parenthood In the dynamic intersection of technology and family, Lisa deftly navigates dual roles as Chief People Officer and Founding Partner at Appsflyer, blending strategic prowess with profound empathy. Beyond the boardroom, she cherishes the bonds of matrimony and parenthood, relis…
  continue reading
 
Everyone is interested in generative AIs and LLMs, and everyone is looking for use cases and apps to apply them to. Just as the early days of the web inspired the original OWASP Top 10 over 20 years ago, the experimentation and adoption of LLMs has inspired a Top 10 list of their own. Sandy Dunn talks about why the list looks so familiar in many wa…
  continue reading
 
A lot of AI security has nothing to do with AI -- things like data privacy, access controls, and identity are concerns for any new software and in many cases AI concerns look more like old-school API concerns. But...there are still important aspects to AI safety and security, from prompt injection to jailbreaking to authenticity. Caleb Sima explain…
  continue reading
 
Companies deploy tools (usually lots of tools) to address different threats to supply chain security. Melinda Marks shares some of the chaos those companies still face when trying to prioritize investments, measure risk, and scale their solutions to keep pace with their development. Not only are companies still figuring out supply chain, but now th…
  continue reading
 
ממצוקה להתעוררות: מסעו של זיו, היזם והפסיכולוג זיו, מייסד שותף של Kai, פלטפורמת ליווי מנטלי ופסיכולוגי מבוססת בינה מלאכותית, הוא יזם ופסיכולוג קליני, מתעמק בתחומי הזוגיות, הורות, יזמות, פסיכולוגיה וחומרים מעצבי תודעה. זיו גדל לצד אב יזם, שכשלונותיו העסקיים הכניסו את משק הבית שלו לסערה כלכלית, עבר ילדות מאתגרת ומלווה במחסור חומרי ורגשי, הן בבית והן …
  continue reading
 
How can open source projects find a funding model that works for them? What are the implications with different sources of funding? Simon Bennetts talks about his stewardship of Zed Attack Proxy and its journey from OWASP to OpenSSF to an Open Source Fellowship with Crash Override. Mark Curphy adds how his experience with OWASP and the appsec commu…
  continue reading
 
In today's episode, we have a fascinating conversation with Brian Welfel, CEO of the ⁠The Beard Club⁠. Brian shares insights into the evolution of his brand, from its beginnings as the Dollar Beard Club to becoming a leading name in men's grooming. We learn about the brand's focus on serving diverse facial hair needs and its strategic approach to p…
  continue reading
 
The Unique Mental Aspects of the CTO Role in a Startup הייתה לי הזכות לאסוף שלושה מוחות מבריקים – רן, עמית ויוסי – לדיון מלא תובנות על ההיבטים המנטאליים והייחודיים בתפקידו של מנהל הטכנולוגיה (CTO) בעולם היזמות. רן, המייסד וה- CTO של Epsagon, שנרכשה על ידי סיסקו תמורת 500 מיליון דולר, הוא חובב בניית מוצרים ואוהב לטייל ולבשל. הוא נשוי לנטע ואב לשני י…
  continue reading
 
There are as many paths into infosec as there are disciplines within infosec to specialize in. Karan Dwivedi talks about the recent book he and co-author Raaghav Srinivasan wrote about security engineering. There's an appealing future to security taking on engineering roles and creating solutions to problems that orgs face. We talk about the breadt…
  continue reading
 
We look into the supply chain saga of the XZ Utils backdoor. It's a wild story of a carefully planned long con to add malicious code to a commonly used package that many SSH connections rely on. It hits themes from social engineering and abuse of trust to obscuring the changes and suppressing warnings. It also has a few lessons about software devel…
  continue reading
 
The Wevo Odyssey - A Startup's Evolution Leading to SolarEdge's Acquisition Teddy, is the Co-founder and CEO of Wevo Energy, a seasoned entrepreneur with a background in Electrical Engineering. His journey began with a childhood fascination for dismantling gadgets, a hobby that foreshadowed his future in technology. After earning his master's degre…
  continue reading
 
Sometimes infosec problems can be summarized succinctly, like "patching is hard". Sometimes a succinct summary sounds convincing, but is based on old data, irrelevant data, or made up data. Adrian Sanabria walks through some of the archeological work he's done to dig up the source of some myths. We talk about some of our favorite (as in most dislik…
  continue reading
 
Loading …

Quick Reference Guide