1. EachPod
EachPod
Application Security Weekly (Audio) - Podcast

Application Security Weekly (Audio)

About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.

Tech News News Technology
Update frequency
every 7 days
Average duration
67 minutes
Episodes
361
Years Active
2018 - 2025
Share to:
Hackers and Policy: Empowering Users and Shaping Discussions at DEF CON, Jeff Moss - ASW #238

Hackers and Policy: Empowering Users and Shaping Discussions at DEF CON, Jeff Moss - ASW #238

Jeff Moss shares some of history of DEF CON, from CFPs to Codes of Conduct, and what makes it a hacker conference. We also discuss the role of hackers and researchers in representing users within pol…

01:20:12  |   Tue 25 Apr 2023
Bug Bounty Programs and Community Building: Unveiling Rewards, Challenges, and Exciting Adventures, Ben Sadeghipour (NahamSec) - ASW #237

Bug Bounty Programs and Community Building: Unveiling Rewards, Challenges, and Exciting Adventures, Ben Sadeghipour (NahamSec) - ASW #237

We talk with Ben about the rewards, hazards, and fun of bug bounty programs. Then we find out different ways to build successful and welcoming communities. A new deps.dev API for supply chain enthusi…

01:10:44  |   Tue 18 Apr 2023
Application Security in the Cloud: Safeguarding Data and Preventing Unauthorized Access, Vandana Verma Sehgal - ASW #236

Application Security in the Cloud: Safeguarding Data and Preventing Unauthorized Access, Vandana Verma Sehgal - ASW #236

Application security in the cloud is a crucial aspect of protecting data and preventing unauthorized access to applications hosted on cloud platforms. As cloud computing becomes more prevalent, ensur…

01:11:10  |   Tue 11 Apr 2023
eBPF: The Future of Security and Infrastructure Tools Revealed, Liz Rice - ASW #235

eBPF: The Future of Security and Infrastructure Tools Revealed, Liz Rice - ASW #235

Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new g…

01:11:50  |   Tue 04 Apr 2023
AI in Production: Unveiling Use Cases, Security Risks, and Real-Life Experiences, Frank Catucci - ASW #234

AI in Production: Unveiling Use Cases, Security Risks, and Real-Life Experiences, Frank Catucci - ASW #234

With the increased interest and use of AI such as GTP 3/4, ChatGPT, GitHub Copilot, and internal modeling, there comes an array of use cases and examples for increased efficiency, but also inherent s…

01:14:53  |   Tue 28 Mar 2023
The Power of Static Analysis: Strengthening Application Security from Code Scrutiny, Josh Goldberg - ASW #233

The Power of Static Analysis: Strengthening Application Security from Code Scrutiny, Josh Goldberg - ASW #233

Static analysis is the art of scrutinizing your code without building or running it. Common static analysis tools are formatters (which change whitespace and other trivia), linters (which detect like…

01:17:28  |   Tue 21 Mar 2023
ASW #232 - Josh Grossman

ASW #232 - Josh Grossman

In this segment, Josh will talk about the OWASP ASVS project which he co-leads. He will talk a little about its background and in particular how it is starting to be used within the security industry…

01:26:21  |   Tue 14 Mar 2023
ASW #231 - Neatsun Ziv

ASW #231 - Neatsun Ziv

In this episode, Neatsun Ziv, co-founder and CEO of Ox security takes a deep dive into supply chain security. He focuses on the new Open Software Supply Chain Attack Reference (OSC&R), a consortium o…

01:20:29  |   Tue 07 Mar 2023
ASW #230 - Lina Lau

ASW #230 - Lina Lau

Join us for this segment with Lina Lau to learn lessons from real incident response engagements covering types of attacks leveraged against the cloud, war stories from supply chain breaches seen in t…

01:11:27  |   Tue 28 Feb 2023
Throwback Episode - ASW #178

Throwback Episode - ASW #178

It's another holiday week, so enjoy this episode from our archives!

What does a collaborative approach to security testing look like? What does it take to tackle an entire attack class as opposed to …

00:33:27  |   Tue 21 Feb 2023
ASW #229 - Nick Selby

ASW #229 - Nick Selby

Organizations spend hundreds of work hours to build applications and services that will benefit customers and employees alike. Whether the application/service is externally facing or for internal use…

01:21:27  |   Tue 14 Feb 2023
ASW #228 - Adrian Sanabria

ASW #228 - Adrian Sanabria

Most of the myths and lies in InfoSec take hold because they seem correct or sound logical. Similar cognitive biases make it possible for even the most preposterous conspiracy theories to become comm…

01:19:28  |   Tue 07 Feb 2023
ASW #227 - Dr. David Movshovitz

ASW #227 - Dr. David Movshovitz

A $10M ransom demand to Riot Games, a DoS in BIND and why there's no version 10, an unexpected refactor at Twilio, insights in Rust from the git security audit, SQL Slammer 20 years later, the SQLMap…

01:12:28  |   Tue 31 Jan 2023
ASW #226 - Marudhamaran Gunasekaran

ASW #226 - Marudhamaran Gunasekaran

Breach disclosures from T-Mobile and PayPal, SSRF in Azure services, Google Threat Horizons report, integer overflows and more, Rust in Chromium, ML for web scanning, Top 10 web hacking techniques of…

01:17:51  |   Tue 24 Jan 2023
Throwback Episode - Dev(Sec)Ops Scanning Challenges & Tips - ASW170

Throwback Episode - Dev(Sec)Ops Scanning Challenges & Tips - ASW170

We're aren't recording this holiday week, so enjoy this ASW throwback episode! Main host Mike Shema selected this episode to share as it's still relevant to the AppSec community today. 

 

This week, …

01:09:36  |   Tue 17 Jan 2023
ASW #225 - Dan Moore

ASW #225 - Dan Moore

Exposed secrets from CircleCI, web hackers target the auto industry, $100K bounty for making Google smart speakers listen, inspiration from Office Space, AWS making better defaults for S3, resources …

01:20:29  |   Tue 10 Jan 2023
ASW #224 - Keith Hoodlet

ASW #224 - Keith Hoodlet

How do you mature a team responsible for securing software? What are effective ways to prioritize investments? We'll discuss a set of posts on building talent, building capabilities, and what mature …

01:16:36  |   Tue 03 Jan 2023
ASW #223 - Jeevan Singh

ASW #223 - Jeevan Singh

FreeBSD joins the ping of death list, exploiting a SQL injection through JSON manipulation, Apple's design for iCloud encryption, attacks against machine learning systems and AIs like ChatGPT

 

Threa…

01:20:33  |   Tue 13 Dec 2022
ASW #222 - Aviv Grafi

ASW #222 - Aviv Grafi

Android platform certs leaked, SQL injection to leaked credentials to cross-tenant access in IBM's Cloud Database, hacking cars through web-based APIs, technical and social considerations when gettin…

01:21:04  |   Tue 06 Dec 2022
ASW #221 - Kenn White

ASW #221 - Kenn White

Crossing tenants with AWS AppSync, more zeros in C++ to defeat vulns, HTTP/3 connection contamination, Thinkst Quarterly review of research, building a research team

 

MongoDB recently announced the …

01:20:59  |   Tue 29 Nov 2022
Disclaimer: The podcast and artwork embedded on this page are the property of Security Weekly Productions. This content is not affiliated with or endorsed by eachpod.com.