243 episodes

A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.

Absolute AppSec Ken Johnson and Seth Law

    • Technology
    • 4.9 • 17 Ratings

A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.

    Episode 243 - w/ Bryan Schmidt

    Episode 243 - w/ Bryan Schmidt

    Bryan Schmidt, information security lead at Adept AI is joining Ken Johnson (@cktricky on twitter/x) and Seth Law (@Sethlaw) for a special episode of Absolute AppSec. Before Adept.AI, Bryan spent the last half decade working as a security engineering manager at, first, Flatiron Health and, later ChowNow, and he worked as a penetration tester and security consultant for that. We’ll be discussing AI during the show as Adept.ai is recently again designated as one of the AI Fortune50. Be sure to tune in to learn a little about Bryan and his trajectory into security and emerging technologies.

    Episode 242 - LLMs Exploiting Vulns, State of DevSecOps

    Episode 242 - LLMs Exploiting Vulns, State of DevSecOps

    Seth and Ken return with analysis of recent research that shows LLMs exploiting known CVEs. And no, it's not completely autonomous yet. This is followed by a breakdown of DataDog's State of DevSecOps article, backing up our gut feel of current industry needs and failures.

    Episode 241 - Secure Defaults, Using LLMs for Code Review

    Episode 241 - Secure Defaults, Using LLMs for Code Review

    **Video may be required**: this episode is focused on demonstrating uses of LLMs against various code. As such, listeners may want to watch the stream to see these uses rather than just listening. Also, Seth and Ken talk briefly at the beginning of the episode about a new tldr;sec project (thanks Clint!) called awesome secure defaults that lists out useful libraries and projects that are secure by default.

    Episode 240 - Code Smells, XZ Backdoor, Hallucinations

    Episode 240 - Code Smells, XZ Backdoor, Hallucinations

    After a week of travel, Seth and Ken return to the podcast with a breakdown of their travel experiences at multiple conferences and teaching their first Practical Secure Code Review course using LLMs to enhance the methodology. This is followed by reinforcement of code review steps including library research, a discussion of the recent XZ backdoor, and an article reviewing LLM hallucinations when recommending libraries.

    Episode 239 - AppSec Intel, CVEs, Authorization

    Episode 239 - AppSec Intel, CVEs, Authorization

    When Ken is away, the geeks will play. Seth is joined by podcast regular Stefan Edwards (@lojikil) to catch up on his recent work around threat hunting. This progresses into a discussion on threat intelligence and what is available for applications. A recent blog post on the utility of the CVE system spurs thoughts on the usefulness of published CVEs. Finally, opinions fly on authorization issues and how simple misconfigurations result in the many vulnerabilities or attack chains.

    Episode 238 - AppSec vs. Enterprise Sec, Supply Chain Tool Analysis

    Episode 238 - AppSec vs. Enterprise Sec, Supply Chain Tool Analysis

    Ken and Seth are back to talk about the difference and competing priorities of Application and Enterprise Security. In short, recent news contends that Enterprise or Infrastructure security is lacking, whereas Application or Product Security is in a good state. This is followed by a discussion on supply chain security tools due to a recent analysis conducted by DoyenSec comparing false positives and negatives from the leading tools.

Customer Reviews

4.9 out of 5
17 Ratings

17 Ratings

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Acquired
Ben Gilbert and David Rosenthal
TED Radio Hour
NPR
Hard Fork
The New York Times

You Might Also Like

The Application Security Podcast
Chris Romeo and Robert Hurlbut
CyberWire Daily
N2K Networks
Malicious Life
Malicious Life
Hacking Humans
N2K Networks
Future of Application Security
Tromzo
Risky Business
Patrick Gray