Podcast Episodes
Back to Search
Enhancing Security: App Modernization, Identity Orchestration, & Big IAM Challenge - Eric Olden - ASW #244
Eric Olden, CEO and Co-Founder of Strata Identity, discusses the concept of Identity Orchestration. He covers the evolving identity landscape and how…
2 years, 9 months ago
What's the Deal with API Security? - Sandy Carielli - ASW #243
Walking the show floor at RSA Conference, you couldn't trip without falling into an application security vendor booth ... and API security specialist…
2 years, 9 months ago
Doing Application Security Right – Farshad Abasi – ASW VAULT
Check out this interview from the ASW VAULT, hand picked by main host Mike Shema! This segment was originally published on March 14, 2022.
Cybersecur…
2 years, 9 months ago
Ten Things I Hate About Lists - ASW #242
The OWASP Top 10 dates back to 2003, when appsec was just settling on terms like cross-site scripting and SQL injection. It's a list that everyone kn…
2 years, 9 months ago
Securing the App Lifecycle: Strategies for Long-Term Software Security and Mitigating the Threat of Malicious Packages - ASW #241
What happens to an app's security after six months? What about a year or two years? A Secure SDLC needs to maintain security throughout an app's life…
2 years, 10 months ago
From Security Theater to Resilience: Unveiling New Approaches to Application Security - ASW #240
What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theate…
2 years, 10 months ago
Navigating the Complexities of Application Security: Vulnerability Management, Risk Mitigation, and Business Logic Attacks - ASW #239
Application security is messy and is getting messier. Modern application security teams are struggling to identify what's more important to fix. Clou…
2 years, 10 months ago
Hackers and Policy: Empowering Users and Shaping Discussions at DEF CON, Jeff Moss - ASW #238
Jeff Moss shares some of history of DEF CON, from CFPs to Codes of Conduct, and what makes it a hacker conference. We also discuss the role of hacker…
2 years, 10 months ago
Bug Bounty Programs and Community Building: Unveiling Rewards, Challenges, and Exciting Adventures, Ben Sadeghipour (NahamSec) - ASW #237
We talk with Ben about the rewards, hazards, and fun of bug bounty programs. Then we find out different ways to build successful and welcoming commun…
2 years, 10 months ago
Application Security in the Cloud: Safeguarding Data and Preventing Unauthorized Access, Vandana Verma Sehgal - ASW #236
Application security in the cloud is a crucial aspect of protecting data and preventing unauthorized access to applications hosted on cloud platforms…
2 years, 11 months ago