Best Owasp podcasts we could find (Updated August 2017)
Related podcasts: Security Computersecurity Informationsecurity Regulatory Pentesting Compliance Cissp Cisa Application Privacy Healthcare Legal Podcasts Web Technology Tech Podcasting Education Whitelisting Whitelisting  
Owasp public [search 0]
show episodes
 
O
OWASP 24/7
Monthly+
 
OWASP 24/7 is a recorded series of discussions with project leads within OWASP. Each week, we talk about the new projects that have come on board, updates to existing projects and interesting bits of trivia that come across our desk.
 
O
OWASP 24/7
Monthly+
 
OWASP 24/7 is a recorded series of discussions with project leads within OWASP. Each week, we talk about the new projects that have come on board, updates to existing projects and interesting bits of trivia that come across our desk.
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
P
Professionally Evil Perspective
Rare
 
This podcast contains random security topics discussed by the Secure Ideas team.
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Loading …
show series
 
Wolfgang Goerlich is using encryption frameworks. Show Notes: Wolfgang's blog at jwgoerllich.com Some terms discussed in the podcast just in case you aren't familiar: SQL injection Password cracker (programs that can assist in figuring out a password by enumerating / guessing) OAuth TLS / HTTPS SFTP SecureString in the .NET framework Companies ...…
 
Earlier this week, Simon Bennetts from the OWASP ZAP Project announced the official availability of the OWASP DockerHub for housing projects. I caught up with Simon soon after to hear how ZAP was utilizing DockerHub and the benefits of containerization.https://hub.docker.com/u/owasp/
 
Aaron Hnatiw joined the show to talk about being a security researcher, teaching application security with Go, and a deep dive on how engineers and developers can get started with infosec. Plus: white hat, black hat, red team, blue team...Aaron sorts it all out for us. Featuring Aaron Hnatiw – Twitter, GitHub Erik St. Martin – Twitter, GitHub C ...…
 
In this episode: Feature interview with Genevieve Southwick - aka Bana Sidhe (pronounced Banshee) - Denver's wrangler of security conferences. Also news from Palo Alto Networks, Secure64, Swimlane and Automox. Full show notes: https://www.colorado-security.com/news/2017/7/15/24-717-show-notesGirl Scouts - selling cookies, camping and... hacking ...…
 
Brett Whittington is concerned about security on data in motion. Note: I said "SSH" at one point, I meant SSL; Brett was too polite to point it out. I also made a mustard pun. Please send your hate tweets to @spetryjohnson. Show Notes: SSL Labs - SSL Server Test ZAPP from OWASP Jim Manico ("AppSec Enthusiast") on Twitter The DROWN attack Heartb ...…
 
Hey everyone, Welcome to the next episode of the #AppSecPodcast. We’re here today with Jim Manico, a project lead with OWASP. We dive deep into some of the projects on his plate. Rate us on iTunes and provide a positive comment, please!
 
Welcome back to the Application Security Podcast! On this episode, we speak with Mike Goodwin, the founder of the OWASP Threat Dragon. We dive into what the threat dragon is and how it can work for you You can find the tool here: https://github.com/mike-goodwin/owasp-threat-dragon Rate us on iTunes and provide a positive comment, please!…
 
Welcome back to the Application Security Podcast! On this episode, we speak with Mike Goodwin, the founder of the OWASP Threat Dragon. We dive into what the threat dragon is and how it can work for you You can find the tool here: https://github.com/mike-goodwin/owasp-threat-dragon Rate us on iTunes and provide a positive comment, please!…
 
Welcome back to the Application Security Podcast! On this episode, we speak with Mike Goodwin, the founder of the OWASP Threat Dragon. We dive into what the threat dragon is and how it can work for you You can find the tool here: https://github.com/mike-goodwin/owasp-threat-dragon Rate us on iTunes and provide a positive comment, please!…
 
This week, we invited Ms. Jessy Irwin (@jessysaurusrex) on to discuss the issues Small and medium businesses and startups have with getting good training, training that is effective and what can be done to address these issues. We also go through several ideas for training subjects that should be addressed by training, and what maybe would be a ...…
 
This week, we invited Ms. Jessy Irwin (@jessysaurusrex) on to discuss the issues Small and medium businesses and startups have with getting good training, training that is effective and what can be done to address these issues. We also go through several ideas for training subjects that should be addressed by training, and what maybe would be a ...…
 
This week, we invited Ms. Jessy Irwin (@jessysaurusrex) on to discuss the issues Small and medium businesses and startups have with getting good training, training that is effective and what can be done to address these issues. We also go through several ideas for training subjects that should be addressed by training, and what maybe would be a ...…
 
On this weeks show we are joined by Colin Hardy to discuss all things Cyber Security.We start off by explaining what got him interested in this branch of computing, highlight what Cyber Security is, and define some of the common terminology.From here, we move on to discuss how he analyses Malware samples (using Automated, Behavioural and Static ...…
 
On this episode of the application security podcast, Robert and I jump over a wall. Just kidding. This isn’t Top Gear. This is our second episode of season two of the #AppSec PodCast. Robert and I talk about the OWASP Top 10 2017 release candidate. We walk through what is the OWASP Top 10, and what is some of the controversy that surrounds the ...…
 
On this episode of the application security podcast, Robert and I jump over a wall. Just kidding. This isn’t Top Gear. This is our second episode of season two of the #AppSec PodCast. Robert and I talk about the OWASP Top 10 2017 release candidate. We walk through what is the OWASP Top 10, and what is some of the controversy that surrounds the ...…
 
On this episode of the application security podcast, Robert and I jump over a wall. Just kidding. This isn’t Top Gear. This is our second episode of season two of the #AppSec PodCast. Robert and I talk about the OWASP Top 10 2017 release candidate. We walk through what is the OWASP Top 10, and what is some of the controversy that surrounds the ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Datenschutz und technisch organisatorische Risiken, sowie mögliche Maßnahmen und ein bisschen neue DSGVO... about this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
Die OWASP Top 10 sind in einer neuen Version verfügbar. Was hat sich geändert? Wo gibt es Diskussionen und was ist das überhaupt?Top 10 Risiken in Web-Anwendungenabout this event: https://c3voc.de
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
In this episode: Alex interviews the Highlands Ranch High School CyberPatriots team, Robb and Alex re-cap the best RMISC yet, and news from Xcel Energy, Ping Identity, LogRhythm, and a breach in Larimer County. Full show notes here: https://www.colorado-security.com/news/2017/5/12/15-515-show-notesRMISC Recap - And meet some CyberPatriotsAhhhh. ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the ModSecurity Core Rule Set Project with project co-lead Christian Folini. The OWASP ModSecurity CRS Project's goal is to provide an easily "pluggable" set of generic attack detection rules that provide a base level of protecti ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the ModSecurity Core Rule Set Project with project co-lead Christian Folini. The OWASP ModSecurity CRS Project's goal is to provide an easily "pluggable" set of generic attack detection rules that provide a base level of protecti ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the OWASP Summit 2017 with conference organizer Sebastien (Seba) Deleersnyder. OWASP Summit 2017 is a 5-day participant driven event, dedicated to the collaboration of Development and Security professionals, with a strong focus o ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the OWASP Summit 2017 with conference organizer Sebastien (Seba) Deleersnyder. OWASP Summit 2017 is a 5-day participant driven event, dedicated to the collaboration of Development and Security professionals, with a strong focus o ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the WebGoat Project with project co-leads Jason White and Nanne Baars. WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons.…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the WebGoat Project with project co-leads Jason White and Nanne Baars. WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons.…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Vicnum Project with project lead Nicole Becher. The Vicnum Project is a collection of intentionally vulnerable web applications. Vicnum applications are commonly used in Capture the Flag exercises at security conferences.…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Vicnum Project with project lead Nicole Becher. The Vicnum Project is a collection of intentionally vulnerable web applications. Vicnum applications are commonly used in Capture the Flag exercises at security conferences.…
 
T
The Testing Show
 
Sometimes, you can find experts on topics in unusual places. This week we discuss security and privacy with Doug Traser, an Information Security Manager with Five9. He’s also the guitar player for Michael’s band, Ensign Red (or is Michael Doug’s singer? We’re never entirely sure). Regardless, if you have questions about security, OWASP, politie ...…
 
S
SailPoint's Mistaken Identity Podcast
 
SailPoint’s Mistaken Identity podcast returns with David Lee and Mike Kiser as hosts This episode’s topics include: OWASP Top 10 Revisions, a breach involving 20,000 consumer passwords, an in-depth analysis of analytics, the top five movies of all-time identified, and an update on the hacker named “Forb.”…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Defect Dojo Project with project lead Greg Anderson. The Defect Dojo is an open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-s ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Defect Dojo Project with project lead Greg Anderson. The Defect Dojo is an open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-s ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Virtual Village Project with project lead Evin Hernandez. The Virtual Village provides users with access to numerous operating system's Desktop as well as Servers. Users are able to create custom apps for other OWASP projects ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Virtual Village Project with project lead Evin Hernandez. The Virtual Village provides users with access to numerous operating system's Desktop as well as Servers. Users are able to create custom apps for other OWASP projects ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Juice Shop Project with project lead Bjoern Kimminich. The Juice Shop is an intentionally insecure webapp for security training, written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe secur ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Juice Shop Project with project lead Bjoern Kimminich. The Juice Shop is an intentionally insecure webapp for security training, written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe secur ...…
 
How do you prevent your app from shipping with preventable security vulnerabilities? This episode we talk to Martin Alderson of Codified Security about their automated Mobile App Security testing service. Hosts: Greg Shackles, Jon Dick Guests: Martin Alderson Links: Codified Security Xamarin App Security Testing OWASP Mobile Top 10 Thanks to ou ...…
 
L
La French Connection
 
Avril 2017 Shownotes and Links Siren de tornade ShadowBroker Déjà patché Exploit: Win XP to Win server 2008 Cpanel exploit! SWIFT - Russie - https://www.rt.com/business/382017-russia-swift-central-bank/ Tour cellulaire fantôme PunyCode Exemple Apple Exemple Emoji OWASP TOP 10, 2017 - Du nouveau! A7-Insufficient Attack Protection (wth!?!) A10-Un ...…
 
Introduction [1:13] Fedora DebianComputer Security[4:37] 2013 Singapore cyber-attacks SSL Threat Modeling Crown Jewels punycode Incident Response Elastic Search Kibana R Python We Build Live with Rahul Clustering Random Forest Machine Learning Adversarial Machine Learning Metasploit Penetration Testing Vulnerability Analysis Malware Reverse Eng ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login