Podcast Episodes
Back to SearchManaging the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344
A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care abo…
6 months, 3 weeks ago
The Future of Supply Chain Security - Janet Worthington - ASW #343
Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk throug…
7 months ago
Uniting software development and application security - Will Vandevanter, Jonathan Schneider - ASW #342
Maintaining code is a lot more than keeping dependencies up to date. It involved everything from keeping old code running to changing frameworks to e…
7 months, 1 week ago
How Product-Led Security Leads to Paved Roads - Julia Knecht - ASW #341
A successful strategy in appsec is to build platforms with defaults and designs that ease the burden of security choices for developers. But there's …
7 months, 2 weeks ago
Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340
AI is more than LLMs. Machine learning algorithms have been part of infosec solutions for a long time. For appsec practitioners, a key concern is alw…
7 months, 3 weeks ago
Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339
What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each w…
8 months ago
Checking in on the State of Appsec in 2025 - Janet Worthington, Sandy Carielli - ASW #338
Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthi…
8 months, 1 week ago
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337
Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compiler…
8 months, 2 weeks ago
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. A…
8 months, 3 weeks ago
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list l…
9 months ago