Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
Episode | Date |
---|---|
12 Factors of Threat Modeling
|
May 14, 2024 |
XZ and the Trouble with Covert Identities in Open Source
|
May 02, 2024 |
Nobody's Going To Mess with Our STRIDE
|
Apr 09, 2024 |
SQLi All Over Again?
|
Apr 02, 2024 |
How I Learned to Stop Worrying and Love the AI
|
Mar 26, 2024 |
Secure by Default in the Developer Toolset and DevEx
|
Mar 19, 2024 |
Debating the Priority and Value of Memory Safety
|
Mar 12, 2024 |
Selling Fear, Uncertainty, and Doubt
|
Feb 27, 2024 |
Prioritizing AppSec: A Conversation Between a VP of Eng, a Product Manager, and a Security "Pro"
|
Feb 20, 2024 |
Villainy, Open Source, and the Software Supply Chain
|
Feb 13, 2024 |
Adam Shostack -- Thinking like an Attacker and Risk Management in the Capabilities
|
Feb 06, 2024 |
Bug Bounty Theater and Responsible Bug Bounty
|
Jan 30, 2024 |
Threat Modeling Capabilities
|
Jan 23, 2024 |
Open Source Puppies and Beer
|
Jan 16, 2024 |
AppSec Resolutions
|
Jan 09, 2024 |
The Impact of Prompt Injection and HackAPrompt_AI in the Age of Security
|
Dec 19, 2023 |
Looking Back, Looking Forward
|
Nov 29, 2023 |
CVSS 4.0 Unleashed with Patrick Garrity
|
Nov 21, 2023 |
An SBOM Lifecycle
|
Nov 14, 2023 |
An SBOM Fable
|
Nov 08, 2023 |
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
|
Oct 24, 2023 |
The Future Role of Security and Shifting off the Table
|
Oct 17, 2023 |
A Show About Nothing that Turned into Something
|
Oct 10, 2023 |
The Hamster Wheel of Scan and Fix
|
Sep 26, 2023 |
Threat Modeling Conference
|
Sep 19, 2023 |
AppSec vs. ProdSec
|
Sep 12, 2023 |
Imposter Syndrome
|
Sep 05, 2023 |
The Return on Investment of Threat Modeling
|
Aug 29, 2023 |
Jim Manico ❤️ Threat Modeling: The Untold Story
|
Aug 22, 2023 |
Secure by Design
|
Aug 15, 2023 |
Security Champions as the Answer to Engineering Hating Security
|
Aug 01, 2023 |
Why Do Engineers Hate Security?
|
Jul 26, 2023 |
Security Posture is a Thing
|
Jul 18, 2023 |
Should #AppSec be Part of the Development Team?
|
Jul 10, 2023 |
Lack of Reasonable, or Everything That Is Wrong with Security Requirements
|
Jun 29, 2023 |
We Don't Know What We Don't Know
|
Jun 20, 2023 |
Privacy and the creepiness factor of collecting data
|
Jun 12, 2023 |
Security Guardrails and Paved Roads
|
Jun 05, 2023 |
Capture the Flag or NOT?
|
May 27, 2023 |
Simple Product Security Requirements
|
May 19, 2023 |
Reasonable Software Security: Do We Really Need DAST?
|
May 04, 2023 |
The Final Take on the National Cybersecurity Strategy: Software Liability And Privacy
|
Apr 27, 2023 |
A Convergence of AI in the World of Cybersecurity
|
Apr 03, 2023 |
The US National Cybersecurity Strategy -- Pillars One and Two
|
Mar 20, 2023 |
The US National Cybersecurity Strategy - Introduction - Part One
|
Mar 13, 2023 |
Application Security, Product Security, and what do we call this thing we do
|
Mar 05, 2023 |
Acronyms, Abbreviations, and a slide into Application Security
|
Feb 27, 2023 |
Security talent conclusion, from the candidates viewpoint
|
Feb 14, 2023 |
Security talent shortage — fact or fiction
|
Feb 07, 2023 |
Lastpass and the Security of Security Products
|
Jan 14, 2023 |
Software bill of materials -- what is it good for?
|
Jan 02, 2023 |
Should security give up on developers?
|
Dec 16, 2022 |
Security tools and the companies that make them
|
Dec 11, 2022 |