54 episodes

The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!

The Security Table Izar Tarandach, Matt Coles, and Chris Romeo

    • Technology

The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!

    Why Developers Will Take Charge of Security, Tests in Prod

    Why Developers Will Take Charge of Security, Tests in Prod

    The script delves into a multifaceted discussion encompassing critiques and praises of book-to-movie adaptations like 'Hitchhiker's Guide to the Galaxy', 'Good Omens', and 'The Chronicles of Narnia'. It then transitions to a serious examination of developers' evolving role in security, advocating for 'shift left' and DevSecOps approaches. The conversation navigates through challenges developers encounter in security practices, stressing the necessity of a DevSecOps framework, secure coding la...

    • 48 min
    12 Factors of Threat Modeling

    12 Factors of Threat Modeling

    Chris, Matt and Izar share their thoughts on an article published by Carnegie Mellon University’s Software Engineering Institute. The list from the article covers various threat modeling methodologies such as STRIDE, PASTA, LinDoN, and OCTAVE methodology for risk management. They emphasize the importance of critical thinking in the field, provide insights into strengths, applications, and limitations of each method, and highlight the significance of annotated threat models for application sec...

    • 45 min
    XZ and the Trouble with Covert Identities in Open Source

    XZ and the Trouble with Covert Identities in Open Source

    Matt, Izar, and Chris delve into the complexities of open source security. They explore the topics of trust, vulnerabilities, and the potential infiltration by malicious actors. They emphasize the importance of proactive security measures, the challenges faced by maintainers, and propose solutions like improved funding models and behavior analysis for enhancing security within the open source ecosystem.FOLLOW OUR SOCIAL MEDIA: ➜Twitter: @SecTablePodcast➜LinkedIn: The Security Table Podcast➜Yo...

    • 43 min
    Nobody's Going To Mess with Our STRIDE

    Nobody's Going To Mess with Our STRIDE

    Matt, Izar, and Chris take issue with a controversial blog post that criticizes STRIDE as being outdated, time-consuming, and does not help the right people do threat modeling. The post goes on to recommend that LLMs should handle the task. The trio counters these points by highlighting STRIDE's origin, utility, and adaptability. Like any good instrument, it is important to use the right tools in the right context. They also touch upon the common misconceptions about threat modeling, the...

    • 39 min
    SQLi All Over Again?

    SQLi All Over Again?

    Chris, Matt, and Izar discuss a recent Secure by Design Alert from CISA on eliminating SQL injection (SQLi) vulnerabilities. The trio critiques the alert's lack of actionable guidance for software manufacturers, and they discuss various strategies that could effectively mitigate such vulnerabilities, including ORMs, communicating the why, and the importance of threat modeling. They also explore potential ways to improve the dissemination and impact of such alerts through partnerships with org...

    • 37 min
    How I Learned to Stop Worrying and Love the AI

    How I Learned to Stop Worrying and Love the AI

    Dive into the contentious world of AI in software development, where artificial intelligence reshapes coding and application security. We spotlight the surge of AI-generated code and the incorporation of copy-pasted snippets from popular forums, focusing on their impact on code quality, security, and maintainability. The conversation critically examines the diminishing role of traditional quality assurance measures versus the growing reliance on automated tools and AI, highlighting potential ...

    • 42 min

Top Podcasts In Technology

Deep Questions with Cal Newport
Cal Newport
Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
The TED AI Show
TED
Hard Fork
The New York Times
See Tomorrow First
See Tomorrow First

You Might Also Like

The Threat Modeling Podcast
Chris Romeo
The Application Security Podcast
Chris Romeo and Robert Hurlbut
Life of a CISO with Dr. Eric Cole
Dr. Eric Cole
CISO Tradecraft®
CISO Tradecraft®
Security Weekly Podcast Network (Audio)
Security Weekly Productions
Cyber Security Headlines
CISO Series