583 avsnitt

The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws.

Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.

Application Security Weekly (Video‪)‬ Security Weekly

    • Nyheter

The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws.

Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.

    • video
    Securing Shadow Apps & Protecting Data - Guy Guzner, Pranava Adduri - ASW Vault

    Securing Shadow Apps & Protecting Data - Guy Guzner, Pranava Adduri - ASW Vault

    With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it’s more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single Sign-On (SSO). So the question becomes, “How do you enable the business while still providing security oversight and governance?”
    This segment is sponsored by Savvy. Visit https://securityweekly.com/savvy to learn more about them!
    CISOs encounter challenges in securing data amidst the rapid growth driven by Cloud and GenAI applications. In this segment, we will delve into how Bedrock Security powers frictionless data security, empowering CISOs to securely manage data sprawl, allowing their businesses to operate at optimal speed, without compromising security.
    Segment Resources:
    Bedrock Security: https://www.bedrock.security/
    Bedrock Security X/Twitter: https://twitter.com/bedrocksec
    Bedrock Security LinkedIn: https://www.linkedin.com/company/bedrocksec/
    House Rx (customer) Case Study: https://tinyurl.com/35v48wx7
    Introductory Whitepaper: https://tinyurl.com/5yjeu92b
    Innovation Sandbox 2024:  https://www.businesswire.com/news/home/20240402284910/en/Bedrock-Security-Named-RSA-Conference-2024-Innovation-Sandbox-Finalist
     
    This segment is sponsored by Bedrock Security. Visit https://securityweekly.com/bedrockrsac to learn more about them!
    Show Notes: https://securityweekly.com/vault-asw-10

    • 30 min
    • video
    Collecting Bounties and Building Communities - Ben Sadeghipour - ASW Vault

    Collecting Bounties and Building Communities - Ben Sadeghipour - ASW Vault

    Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 18, 2023.
    We talk with Ben about the rewards, hazards, and fun of bug bounty programs. Then we find out different ways to build successful and welcoming communities.
    Show Notes: https://securityweekly.com/vault-asw-9

    • 36 min
    • video
    Unpacking XDR & Business Applications - Chris Thomas, Oliver Tavakoli - ASW #286

    Unpacking XDR & Business Applications - Chris Thomas, Oliver Tavakoli - ASW #286

    The challenge of evaluating threat alerts in aggregate – what a collection and sequence of threat signals tell us about an attacker’s sophistication and motives – has bedeviled SOC teams since the dawn of the Iron Age. Vectra AI CTO Oliver Tavakoli will discuss how the design principles of our XDR platform deal with this challenge and how GenAI impacts this perspective.
    Segment Resources:
    Vectra AI Platform Video: https://vimeo.com/916801622
    Blog: https://www.vectra.ai/blog/what-is-xdr-the-promise-of-xdr-capabilities-explained
    Blog: https://www.vectra.ai/blog/xdr-explored-the-evolution-and-impact-of-extended-detection-and-response
    MXDR Calculator: https://www.vectra.ai/calculators/mxdr-value-calculator
    This segment is sponsored by Vectra AI. Visit https://securityweekly.com/vectrarsac to learn more about them!
    In this interview, we will discuss the network security challenges of business applications and how they can also be the solution. AlgoSec has spent over two decades tackling tough security issues in some of the world’s most complex networks. Now, they’re applying their expertise to hybrid networks—where customers are combining their on-premise resources along with multiple cloud providers.
    Segment Resources: https://www.algosec.com/resources/
    This segment is sponsored by AlgoSec. Visit https://securityweekly.com/algosecrsac to learn more about them!
    Show Notes: https://securityweekly.com/asw-286

    • 30 min
    • video
    Node.js Secure Coding - Liran Tal - ASW #286

    Node.js Secure Coding - Liran Tal - ASW #286

    Secure coding education should be more than a list of issues or repeating generic advice. Liran Tal explains his approach to teaching developers through examples that start with exploiting known vulns and end with discussions on possible fixes. Not only does this create a more engaging experience, but it also relies on code that looks familiar to developers rather than contrived or overly simplistic examples.
    Segment resources:
    https://github.com/lirantal https://cheatsheetseries.owasp.org/cheatsheets/NPMSecurityCheat_Sheet.html https://lirantal.com/blog/poor-express-authentication-patterns-nodejs Show Notes: https://securityweekly.com/asw-286

    • 38 min
    • video
    The Enterprise Browser & AI in Securing Software and Supply Chains - Mike Fey, Josh Lemos - ASW #285

    The Enterprise Browser & AI in Securing Software and Supply Chains - Mike Fey, Josh Lemos - ASW #285

    How companies are benefiting from the enterprise browser. It's not just security when talking about the enterprise browser. It's the marriage between security AND productivity. In this interview, Mike will provide real live case studies on how different enterprises are benefitting.
    Segment Resources:
    https://www.island.io/resources https://www.island.io/press This segment is sponsored by Island. Visit https://www.securityweekly.com/islandrsac to learn more about them!
    The cybersecurity landscape continues to transform, with a growing focus on mitigating supply chain vulnerabilities, enforcing data governance, and incorporating AI into security measures. This transformation promises to steer DevSecOps teams toward software development processes with efficiency and security at the forefront. Josh Lemos, Chief Information Security Officer at GitLab will discuss the role of AI in securing software and data supply chains and helping developers work more efficiently while creating more secure code.
    This segment is sponsored by GitLab. Visit https://securityweekly.com/gitlabrsac to learn more about them!
    Show Notes: https://securityweekly.com/asw-285

    • 29 min
    • video
    Inside the OWASP Top 10 for LLM Applications - Sandy Dunn - ASW #285

    Inside the OWASP Top 10 for LLM Applications - Sandy Dunn - ASW #285

    Everyone is interested in generative AIs and LLMs, and everyone is looking for use cases and apps to apply them to. Just as the early days of the web inspired the original OWASP Top 10 over 20 years ago, the experimentation and adoption of LLMs has inspired a Top 10 list of their own. Sandy Dunn talks about why the list looks so familiar in many ways -- after all, LLMs are still software. But the list captures some new concepts that anyone looking to use LLMs or generative AIs should be aware of.
    https://llmtop10.com/ https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki/Educational-Resources https://owasp.org/www-project-ai-security-and-privacy-guide/ https://gandalf.lakera.ai/ https://quarkiq.com/blog Show Notes: https://securityweekly.com/asw-285

    • 37 min

Mest populära poddar inom Nyheter

Gräns
Sveriges Radio
Eftermiddag i P3
Sveriges Radio
Europapodden
Sveriges Radio
Pelle och Gustav
Pelle och Gustav
Ekot nyhetssändning
Sveriges Radio
Dagens Eko
Sveriges Radio

Du kanske också gillar

The Application Security Podcast
Chris Romeo and Robert Hurlbut
The Stack Overflow Podcast
The Stack Overflow Podcast
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Cybersecurity Today
ITWC
Cyber Security Headlines
CISO Series
Hacking Humans
N2K Networks