Podcast Episodes
Back to SearchQuantum Computing Isn't A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from eve…
4 months, 2 weeks ago
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succee…
4 months, 3 weeks ago
Inside the OWASP GenAI Security Project - Steve Wilson - ASW #352
Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for t…
5 months ago
Finding Large Bounties with Large Language Models - Nico Waisman - ASW #351
Software has forever had flaws and humans have forever been finding and fixing them. With LLMs generating code, appsec has also been trying to determ…
5 months, 1 week ago
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important t…
5 months, 2 weeks ago
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek de…
5 months, 3 weeks ago
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization …
6 months ago
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
Up first, the ASW news of the week.
At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knoc…
6 months, 1 week ago
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Chris Boehm, Idan Plotnik, Josh Lemos, Michael Callahan - ASW #346
In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agen…
6 months, 2 weeks ago
Translating Security Regulations into Secure Projects - Roman Zhukov, Emily Fox - ASW #345
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Z…
6 months, 2 weeks ago