577 episodes

The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws.

Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.

Application Security Weekly (Video‪)‬ Security Weekly

    • News

The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws.

Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.

    • video
    Hacking AI Bias with Human Techniques - Keith Hoodlet - ASW #284

    Hacking AI Bias with Human Techniques - Keith Hoodlet - ASW #284

    We already have bug bounties for web apps so it was only a matter of time before we would have bounties for AI-related bugs. Keith Hoodlet shares his experience winning first place in the DOD's inaugural AI bias bounty program. He explains how his education in psychology helped fill in the lack of resources in testing an AI's bias. Then we discuss how organizations should approach the very different concepts of AI security and AI safety.
    Segment Resources:
    https://securing.dev/posts/hacking-ai-bias/ https://www.defense.gov/News/Releases/Release/Article/3659519/cdao-launches-first-dod-ai-bias-bounty-focused-on-unknown-risks-in-llms/ Show Notes: https://securityweekly.com/asw-284

    • 31 min
    • video
    AI & Hype & Security (Oh My!) - Caleb Sima - ASW #284

    AI & Hype & Security (Oh My!) - Caleb Sima - ASW #284

    A lot of AI security has nothing to do with AI -- things like data privacy, access controls, and identity are concerns for any new software and in many cases AI concerns look more like old-school API concerns. But...there are still important aspects to AI safety and security, from prompt injection to jailbreaking to authenticity. Caleb Sima explains why it's important to understand the different types of AI and the practical tasks necessary to secure how it's used.
    Segment resources:
    https://calebsima.com/2023/08/16/demystifing-llms-and-threats/ https://www.youtube.com/watch?v=qgDtOu17E&t=1s Show Notes: https://securityweekly.com/asw-284

    • 33 min
    • video
    Random Problems, Protecting Packages, and Vulns in Designs, Defaults & Data Leaks - ASW #283

    Random Problems, Protecting Packages, and Vulns in Designs, Defaults & Data Leaks - ASW #283

    Misusing random numbers, protecting platforms for code repos and package repos, vulns that teach us about designs and defaults, and more!
    Show Notes: https://securityweekly.com/asw-283

    • 38 min
    • video
    Why Companies Continue to Struggle with Supply Chain Security - Melinda Marks - ASW #283

    Why Companies Continue to Struggle with Supply Chain Security - Melinda Marks - ASW #283

    Companies deploy tools (usually lots of tools) to address different threats to supply chain security. Melinda Marks shares some of the chaos those companies still face when trying to prioritize investments, measure risk, and scale their solutions to keep pace with their development. Not only are companies still figuring out supply chain, but now they're bracing for the coming of genAI and how that will just further highlight the current struggles they're having with data security and data privacy.
    Segment Resources:
    Complete Survey Results: The Growing Complexity of Securing the Software Supply Chain
    https://research.esg-global.com/reportaction/515201781/Toc 
    Show Notes: https://securityweekly.com/asw-283

    • 41 min
    • video
    XZ & Open Source, PuTTY's Private Keys, LeakyCLI, LLMs Writing Exploits - ASW #282

    XZ & Open Source, PuTTY's Private Keys, LeakyCLI, LLMs Writing Exploits - ASW #282

    CISA chimes in on the XZ Utils backdoor, PuTTY's private keys and maintaining a secure design, LeakyCLI and maintaining secure secrets in CSPs, LLMs and exploit generation, and more!
    Show Notes: https://securityweekly.com/asw-282

    • 38 min
    • video
    Sustainable Funding of Open Source Tools - Simon Bennetts, Mark Curphey - ASW #282

    Sustainable Funding of Open Source Tools - Simon Bennetts, Mark Curphey - ASW #282

    How can open source projects find a funding model that works for them? What are the implications with different sources of funding? Simon Bennetts talks about his stewardship of Zed Attack Proxy and its journey from OWASP to OpenSSF to an Open Source Fellowship with Crash Override. Mark Curphy adds how his experience with OWASP and the appsec community motivated him to create Crash Override and help projects like ZAP gain the support they deserve.
    Segment resources:
    https://crashoverride.com/blog/welcome-zap-to-the-open-source-fellowship https://www.zaproxy.org https://crashoverride.com/blog/are-there-too-many-bubbles-of-similar-security-efforts Show Notes: https://securityweekly.com/asw-282

    • 39 min

Top Podcasts In News

Kohe selgub
Delfi Meedia
Välismääraja
Kuku Raadio
Что это было?
BBC Russian Radio
Живой Гвоздь
Живой Гвоздь
Keskpäevatund
Kuku Raadio
Global News Podcast
BBC World Service

You Might Also Like

The Application Security Podcast
Chris Romeo and Robert Hurlbut
Future of Application Security
Tromzo
The Stack Overflow Podcast
The Stack Overflow Podcast
The Security Table
Izar Tarandach, Matt Coles, and Chris Romeo
Security Weekly News (Audio)
Security Weekly Productions
Defense in Depth
David Spark