1. EachPod
EachPod
Application Security Weekly (Audio) - Podcast

Application Security Weekly (Audio)

About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.

Tech News News Technology
Update frequency
every 7 days
Average duration
67 minutes
Episodes
361
Years Active
2018 - 2025
Share to:
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347

Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347

Up first, the ASW news of the week.

At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the ter…

01:17:09  |   Tue 09 Sep 2025
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Chris Boehm, Idan Plotnik, Josh Lemos, Michael Callahan - ASW #346

AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Chris Boehm, Idan Plotnik, Josh Lemos, Michael Callahan - ASW #346

In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and …

01:08:11  |   Tue 02 Sep 2025
Translating Security Regulations into Secure Projects - Roman Zhukov, Emily Fox - ASW #345

Translating Security Regulations into Secure Projects - Roman Zhukov, Emily Fox - ASW #345

The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators …

01:13:31  |   Tue 26 Aug 2025
Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344

Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344

A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a cont…

01:08:17  |   Tue 19 Aug 2025
The Future of Supply Chain Security - Janet Worthington - ASW #343

The Future of Supply Chain Security - Janet Worthington - ASW #343

Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the so…

00:42:13  |   Tue 12 Aug 2025
Uniting software development and application security - Will Vandevanter, Jonathan Schneider - ASW #342

Uniting software development and application security - Will Vandevanter, Jonathan Schneider - ASW #342

Maintaining code is a lot more than keeping dependencies up to date. It involved everything from keeping old code running to changing frameworks to even changing implementation languages. Jonathan Sc…

00:58:07  |   Tue 05 Aug 2025
How Product-Led Security Leads to Paved Roads - Julia Knecht - ASW #341

How Product-Led Security Leads to Paved Roads - Julia Knecht - ASW #341

A successful strategy in appsec is to build platforms with defaults and designs that ease the burden of security choices for developers. But there's an important difference between expecting (or requ…

01:04:11  |   Tue 29 Jul 2025
Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340

Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340

AI is more than LLMs. Machine learning algorithms have been part of infosec solutions for a long time. For appsec practitioners, a key concern is always going to be how to evaluate the security of so…

01:06:35  |   Tue 22 Jul 2025
Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339

Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339

What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared…

01:07:50  |   Tue 15 Jul 2025
Checking in on the State of Appsec in 2025 - Janet Worthington, Sandy Carielli - ASW #338

Checking in on the State of Appsec in 2025 - Janet Worthington, Sandy Carielli - ASW #338

Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this …

01:07:15  |   Tue 08 Jul 2025
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337

Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337

Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis…

00:38:26  |   Tue 01 Jul 2025
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336

How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336

Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and a…

01:01:18  |   Tue 24 Jun 2025
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335

Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335

What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out…

01:08:00  |   Tue 17 Jun 2025
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334

Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334

CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Roger…

01:09:09  |   Tue 10 Jun 2025
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333

AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333

The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased tw…

00:39:06  |   Tue 03 Jun 2025
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332

AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332

ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, develo…

01:04:35  |   Tue 27 May 2025
Appsec News & Interviews from RSAC on Identity and AI - Rami Saas, Charlotte Wylie - ASW #331

Appsec News & Interviews from RSAC on Identity and AI - Rami Saas, Charlotte Wylie - ASW #331

In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for…

01:01:48  |   Tue 20 May 2025
Secure Code Reviews, LLM Coding Assistants, and Trusting Code - Rey Bango, Karim Toubba, Gal Elbaz - ASW #330

Secure Code Reviews, LLM Coding Assistants, and Trusting Code - Rey Bango, Karim Toubba, Gal Elbaz - ASW #330

Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether hum…

01:09:38  |   Tue 13 May 2025
AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Vishal Gupta, Idan Plotnik - ASW #329

AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Vishal Gupta, Idan Plotnik - ASW #329

We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is ho…

01:03:03  |   Tue 06 May 2025
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328

Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328

In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons.

00:44:08  |   Tue 29 Apr 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Security Weekly Productions. This content is not affiliated with or endorsed by eachpod.com.