Application Security PodCast-logo

Application Security PodCast

Technology Podcasts >

More Information

Location:

United States

Language:

English

Contact:

919-335-5482


Episodes

Malicious User Stories (S03E18) - Application Security PodCast

5/22/2018
More
On this episode, Robert speaks with Apollo Clark about Malicious User Stories and DevOps. He discusses how to properly handle user stories in a world being taken over by DevOps. You can find Apollo on Twitter @apolloclark

Duration:00:26:40

Neurodiversity in Security (S03E17) - Application Security PodCast

5/15/2018
More
On this episode, Robert is joined by Megan Roddie at the SOURCE Conference in Boston. She talks about the how neurodiverse people can truly help an organization. You can find her on Twitter @megan_roddie

Duration:00:20:10

AppSec and Hardware (S03E16) - Application Security PodCast

4/27/2018
More
Chase Schultz joins this week to discuss the combination of AppSec and hardware. He also dives into how the Meltdown and Spectre attacks worked. You can find Chase on Twitter @f47h3r_B0

Duration:00:21:01

#OWASP AppSensor (S03E15) - Application Security PodCast

4/20/2018
More
John Melton joins to discuss the #OWASP AppSensor project. He talks about how AppSensor works and how it can be used in your application. You can find John on Twitter @_jtmelton OWASP AppSensor Project

Duration:00:37:31

Third Party Software is not a Cathedral, It’s a Bazaar (S03E14) - Application Security PodCast

4/13/2018
More
David Habusha joins on this weeks episode to discuss the OWASP Top 10 A9: Using components with known vulnerabilities. He also dives into the Software Composition Analysis (SCA) market. You can find David on Twitter @davidhabusha OWASP Top 10 A9

Duration:00:39:28

Dependency Check and Dependency Track (S03E13) - Application Security PodCast

4/12/2018
More
Steve Springett joins the show to talk Dependency Check and Dependency Track. He also discusses how they can be used to help prevent you from using components with known vulnerabilities. OWASP Dependency Check OWASP Dependency Track You can find Steve on Twitter @stevespringett

Duration:00:45:09

The #OWASP Threat Modeling Project (S03E12) - Application Security PodCast

4/6/2018
More
Steven Wierckx joins Robert and Chris this week to talk about the #OWASP Threat Modeling project that he’s involved in. You can find Steven on Twitter @ihackforfun https://open-security-summit.org/

Duration:00:35:12

The #OWASP Cheat Sheet Project (S03E11) - Application Security PodCast

4/5/2018
More
Jim Manico joins on this weeks episode to discuss some of the changes with the OWASP Cheat Sheets and the plans they have for the future of that project. Jim also talks about how they are looking for experts in the field to create or update some of the Cheat Sheets. You can find Jim on Twitter @manicode

Duration:00:27:34

OWASP Top 10 #10: Logging (S03E10) - Application Security PodCast

3/23/2018
More
Neil Smithline joins this week to discuss one one of the new items on the OWASP Top 10 List, Insufficient Logging and Monitoring. Links: OWASP Logging Cheat Sheet OWASP ASVS OWASP Proactive Controls: Intrusion Detection You can find Neil on Twitter @neilsmithine

Duration:00:36:48

Selling #AppSec Up The Chain (S03E09) - Application Security PodCast

3/15/2018
More
Jim Routh joins the podcast to discuss selling #AppSec up the chain. Jim has built 5 successful software security programs in his career and serves as a CISO now. Jim shares his real-world experience with how to successfully sell #AppSec to senior management (as well as many other pieces of wisdom for running an AppSec program). You can find Jim on Twitter @jmrouth01

Duration:00:45:39

#AppSec Recommendations (S03E08) - Application Security PodCast

3/9/2018
More
Chris and Robert go over a plethora of recommendations they have accumulated over their years of experience in the industry. Chris’s recommendations 1. Book: Agile Application Security: Enabling Security in a Continuous Delivery Pipeline by Laura Bell (Author),‎ Michael Brunton-Spall (Author),‎ Rich Smith (Author),‎ Jim Bird (Author) https://amzn.com/1491938846 2. Website: Iron Geek Adrian Crenshaw records many major, non-commercial security conferences and posts the talks to Youtube...

Duration:00:30:41

Hustle and Flow: Dealing With Burnout in Security (S03E07) - Application Security PodCast

3/2/2018
More
Magen Wu works through the topic of burnouts and mental health in the world of security. She gives some examples on how to handle this and how to recognize if people around you are burning out. You can find her on Twitter @infosec_tottie Additional information on this topic: Jack Daniel speaks often on this topic of burnout Youtube: The Causes of and Solutions for Security Burnout Youtube: Infosec Survival Skills: Being Productive, Coping with Stress, & Preventing Burnout Article: Becoming...

Duration:00:29:33

OWASP Top 10 #4 XXE (S03E06) - Application Security PodCast

2/23/2018
More
Katy Anton joins this week to discuss number four on the OWASP Top 10. She dives into what XXE is, how to deal with it, and some of the other new items on the OWASP Top 10 2017. You can find Katy on Twitter @KatyAnton

Duration:00:23:29

SAST, DAST, and IAST. Oh My! (S03E05) - Application Security PodCast

2/15/2018
More
Pete Chestna is an advocate for SAST, DAST, and IAST tools and a passionate #AppSec enthusiast. A moving quote that Pete shared during this episode is “an #AppSec program is the byproduct of building secure developers.” #Truth Pete describes the differences between SAST, DAST, IAST, and RASP, the struggles that developers encounter using new tools, false positives that occur and how to reduce them, and advice for building an #AppSec program from scratch versus adding tools to a mature...

Duration:00:35:20

We Are Not Making It Worse (S03E04) - Application Security PodCast

2/9/2018
More
With episode 4, Robert and Chris are joined by Irene Michlin who is operating at the intersection of security and agility. They discuss incremental threat modeling and how to do threat modeling when living in an Agile or DevOps world. Irene ends our discussion by saying that her goal when working with a team on threat modeling is that they all conclude “We are not making it worse.” You can find Irene on Twitter @IreneMichlin, and check out Irene’s talk on... Read More Read More

Duration:00:33:02

Insecure Deserialization (S03E03) - Application Security PodCast

2/2/2018
More
Bill Sempf joins to talk insecure deserialization. We do a deep dive and contextual review of the generalities of deserialization, and the specifics of how it applies to “.NET”. Bill gets into his journey to understand these types of vulnerabilities and provides some hints and tips for how you can look for them in your code.

Duration:00:34:06

Security Champions (S03E02) - Application Security PodCast

1/26/2018
More
Security champions are the hands and feet of any well-equipped product security team. Robert and Chris introduce security champions, where to find them, why you need them, and how to set up a beginning champion program from scratch. Here are a few other resources that we’ve written about Security Champions: Do you have Security Champions in your company? Information security needs community: 6 ways to build up your teams

Duration:00:26:52

Shifting left (S03E01) - Application Security PodCast

1/19/2018
More
Welcome to season 3 of the podcast. In this episode, Robert and Chris interview Kevin Greene from Mitre. We discuss an article Kevin wrote about shifting left and explore codifying intuitions and new projects at Mitre that will bolster the knowledge of your developers and testers. Kevin brings up the lack of true results from the SAST and DAST tools on the market. He brings an interesting perspective, having focused on research and development in his time at DHS. We... Read More Read More

Duration:00:33:01

OWASP for everyone (S02E21) - Application Security PodCast

12/5/2017
More
This is the conclusion of Season 02 for the AppSec PodCast. In this episode, we focus in on all the OWASP goodness we’ve experienced this year. You’ll hear our favorite clips and explanations from a season full of OWASP. With the publication of this episode, season 02 is a wrap, and on to season 03 which will roll out in March. Please visit our iTunes page and give us a 5 star review!

Duration:00:31:41

Containers Again (S02E20) - Application Security PodCast

10/24/2017
More
This is the final interview from the #AppSecUSA Conference in Orlando, and Chris and Robert are joined by Brian Andrzejewski. He talks about containers, their usage within #AppSec, and about orchestrations. Rate us on iTunes and provide a positive comment, please!

Duration:00:29:31

Try Premium for 30 days

Live games for all NFL, MLB, NBA, & NHL teams
Commercial-Free Music
No Display Ads