On this episode, Julien Vehent joins to discuss all things DevOps + Security. They talk through Julien's new book, Securing DevOps. They go in depth as to the journey he went through building security into DevOps. You can find Julien on Twitter @jvehent We will be giving away 4 digital copies of Julien's new book. [...]
The post Securing DevOps (S04E03) appeared first on Security Journey.
Christian Folini joins Chris at AppSec EU for this episode about ModSecurity and the Core Rule Set project from OWASP. They dive into the timeline for the abstraction layer piece of the project and much more. You can find Christian on Twitter @ChrFolini. OWASP ModSecurity Core Rule Set ModSecurity
The post CRS and an Abstraction Layer (S04E02) appeared first on Security Journey.
On this episode, Chris is joined by Sean Wright to discuss the changes Google made with how they handle the HTTP Protocol. They also dive into TLS and some other pieces of crypto that relate to #AppSec. You can find Sean on Twitter @SeanWrightSec
The post Google Chrome and the Case of the Disappearing HTTP (S04E01) appeared first on Security Journey.
The conclusion of Season 3, all the best highlights, and some great advice from our guests on what you need to build an #AppSec Program. We’ll be back in August with more episodes and more interviews. Enjoy!
On this episode, Robert speaks with Apollo Clark about Malicious User Stories and DevOps. He discusses how to properly handle user stories in a world being taken over by DevOps. You can find Apollo on Twitter @apolloclark
On this episode, Robert is joined by Megan Roddie at the SOURCE Conference in Boston. She talks about the how neurodiverse people can truly help an organization. You can find her on Twitter @megan_roddie
John Melton joins to discuss the #OWASP AppSensor project. He talks about how AppSensor works and how it can be used in your application. You can find John on Twitter @_jtmelton OWASP AppSensor Project
David Habusha joins on this weeks episode to discuss the OWASP Top 10 A9: Using components with known vulnerabilities. He also dives into the Software Composition Analysis (SCA) market. You can find David on Twitter @davidhabusha OWASP Top 10 A9
Steve Springett joins the show to talk Dependency Check and Dependency Track. He also discusses how they can be used to help prevent you from using components with known vulnerabilities. OWASP Dependency Check OWASP Dependency Track You can find Steve on Twitter @stevespringett
Jim Manico joins on this weeks episode to discuss some of the changes with the OWASP Cheat Sheets and the plans they have for the future of that project. Jim also talks about how they are looking for experts in the field to create or update some of the Cheat Sheets. You can find Jim on Twitter @manicode
Neil Smithline joins this week to discuss one one of the new items on the OWASP Top 10 List, Insufficient Logging and Monitoring. Links: OWASP Logging Cheat Sheet OWASP ASVS OWASP Proactive Controls: Intrusion Detection You can find Neil on Twitter @neilsmithine
Jim Routh joins the podcast to discuss selling #AppSec up the chain. Jim has built 5 successful software security programs in his career and serves as a CISO now. Jim shares his real-world experience with how to successfully sell #AppSec to senior management (as well as many other pieces of wisdom for running an AppSec program). You can find Jim on Twitter @jmrouth01
Chris and Robert go over a plethora of recommendations they have accumulated over their years of experience in the industry. Chris’s recommendations 1. Book: Agile Application Security: Enabling Security in a Continuous Delivery Pipeline by Laura Bell (Author), Michael Brunton-Spall (Author), Rich Smith (Author), Jim Bird (Author) https://amzn.com/1491938846 2. Website: Iron Geek Adrian Crenshaw records many major, non-commercial security conferences and posts the talks to Youtube...
Magen Wu works through the topic of burnouts and mental health in the world of security. She gives some examples on how to handle this and how to recognize if people around you are burning out. You can find her on Twitter @infosec_tottie Additional information on this topic: Jack Daniel speaks often on this topic of burnout Youtube: The Causes of and Solutions for Security Burnout Youtube: Infosec Survival Skills: Being Productive, Coping with Stress, & Preventing Burnout Article: Becoming...
Katy Anton joins this week to discuss number four on the OWASP Top 10. She dives into what XXE is, how to deal with it, and some of the other new items on the OWASP Top 10 2017. You can find Katy on Twitter @KatyAnton
Pete Chestna is an advocate for SAST, DAST, and IAST tools and a passionate #AppSec enthusiast. A moving quote that Pete shared during this episode is “an #AppSec program is the byproduct of building secure developers.” #Truth Pete describes the differences between SAST, DAST, IAST, and RASP, the struggles that developers encounter using new tools, false positives that occur and how to reduce them, and advice for building an #AppSec program from scratch versus adding tools to a mature...