The Security Table

By Izar Tarandach, Matt Coles, and Chris Romeo

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 3
Reviews: 0
Episodes: 53

Description

The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!


Episode Date
12 Factors of Threat Modeling
May 14, 2024
XZ and the Trouble with Covert Identities in Open Source
May 02, 2024
Nobody's Going To Mess with Our STRIDE
Apr 09, 2024
SQLi All Over Again?
Apr 02, 2024
How I Learned to Stop Worrying and Love the AI
Mar 26, 2024
Secure by Default in the Developer Toolset and DevEx
Mar 19, 2024
Debating the Priority and Value of Memory Safety
Mar 12, 2024
Selling Fear, Uncertainty, and Doubt
Feb 27, 2024
Prioritizing AppSec: A Conversation Between a VP of Eng, a Product Manager, and a Security "Pro"
Feb 20, 2024
Villainy, Open Source, and the Software Supply Chain
Feb 13, 2024
Adam Shostack -- Thinking like an Attacker and Risk Management in the Capabilities
Feb 06, 2024
Bug Bounty Theater and Responsible Bug Bounty
Jan 30, 2024
Threat Modeling Capabilities
Jan 23, 2024
Open Source Puppies and Beer
Jan 16, 2024
AppSec Resolutions
Jan 09, 2024
The Impact of Prompt Injection and HackAPrompt_AI in the Age of Security
Dec 19, 2023
Looking Back, Looking Forward
Nov 29, 2023
CVSS 4.0 Unleashed with Patrick Garrity
Nov 21, 2023
An SBOM Lifecycle
Nov 14, 2023
An SBOM Fable
Nov 08, 2023
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
Oct 24, 2023
The Future Role of Security and Shifting off the Table
Oct 17, 2023
A Show About Nothing that Turned into Something
Oct 10, 2023
The Hamster Wheel of Scan and Fix
Sep 26, 2023
Threat Modeling Conference
Sep 19, 2023
AppSec vs. ProdSec
Sep 12, 2023
Imposter Syndrome
Sep 05, 2023
The Return on Investment of Threat Modeling
Aug 29, 2023
Jim Manico ❤️ Threat Modeling: The Untold Story
Aug 22, 2023
Secure by Design
Aug 15, 2023
Security Champions as the Answer to Engineering Hating Security
Aug 01, 2023
Why Do Engineers Hate Security?
Jul 26, 2023
Security Posture is a Thing
Jul 18, 2023
Should #AppSec be Part of the Development Team?
Jul 10, 2023
Lack of Reasonable, or Everything That Is Wrong with Security Requirements
Jun 29, 2023
We Don't Know What We Don't Know
Jun 20, 2023
Privacy and the creepiness factor of collecting data
Jun 12, 2023
Security Guardrails and Paved Roads
Jun 05, 2023
Capture the Flag or NOT?
May 27, 2023
Simple Product Security Requirements
May 19, 2023
Reasonable Software Security: Do We Really Need DAST?
May 04, 2023
The Final Take on the National Cybersecurity Strategy: Software Liability And Privacy
Apr 27, 2023
A Convergence of AI in the World of Cybersecurity
Apr 03, 2023
The US National Cybersecurity Strategy -- Pillars One and Two
Mar 20, 2023
The US National Cybersecurity Strategy - Introduction - Part One
Mar 13, 2023
Application Security, Product Security, and what do we call this thing we do
Mar 05, 2023
Acronyms, Abbreviations, and a slide into Application Security
Feb 27, 2023
Security talent conclusion, from the candidates viewpoint
Feb 14, 2023
Security talent shortage — fact or fiction
Feb 07, 2023
Lastpass and the Security of Security Products
Jan 14, 2023
Software bill of materials -- what is it good for?
Jan 02, 2023
Should security give up on developers?
Dec 16, 2022
Security tools and the companies that make them
Dec 11, 2022