Podcast Episodes
Back to SearchThe Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the secu…
2 months, 1 week ago
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363
In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as…
2 months, 2 weeks ago
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362
Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secu…
2 months, 3 weeks ago
Developing Open Source Skills for Maintaining Projects - Kat Cosgrove - ASW #361
Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different …
3 months ago
Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360
The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to A…
3 months, 1 week ago
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens a…
3 months, 2 weeks ago
Figuring Out Where to Start with Secure Code - ASW #358
What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a busines…
3 months, 2 weeks ago
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his…
3 months, 3 weeks ago
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clickin…
4 months ago
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfi…
4 months, 1 week ago