Podcast Episodes

Back to Search
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364

Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the secu…

2 months, 1 week ago

Short Long
View Episode
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363

In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as…

2 months, 2 weeks ago

Short Long
View Episode
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362

Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secu…

2 months, 3 weeks ago

Short Long
View Episode
Developing Open Source Skills for Maintaining Projects - Kat Cosgrove - ASW #361
Developing Open Source Skills for Maintaining Projects - Kat Cosgrove - ASW #361

Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different …

3 months ago

Short Long
View Episode
Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360
Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360

The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to A…

3 months, 1 week ago

Short Long
View Episode
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens a…

3 months, 2 weeks ago

Short Long
View Episode
Figuring Out Where to Start with Secure Code - ASW #358
Figuring Out Where to Start with Secure Code - ASW #358

What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a busines…

3 months, 2 weeks ago

Short Long
View Episode
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357

Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his…

3 months, 3 weeks ago

Short Long
View Episode
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356

Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clickin…

4 months ago

Short Long
View Episode
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355

Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfi…

4 months, 1 week ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us