Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
AppSec at SMEs, how are your peers doing?
|
May 19, 2026 |
|
Operational Security With SAMMY
|
May 12, 2026 |
|
Appsec Management With SAMMY
|
May 05, 2026 |
|
AI in AppSec, May 2026 Update
|
Apr 28, 2026 |
|
Introduction to EU DORA
|
Apr 21, 2026 |
|
CRA Standards
|
Apr 14, 2026 |
|
Introduction to Secure Control Frameworks
|
Apr 07, 2026 |
|
How to build and manage your appsec program.
|
Mar 31, 2026 |
|
NIS2 Directive: Everything you need to know
|
Mar 24, 2026 |
|
NIST SSDF 1.2: an introduction
|
Mar 17, 2026 |
|
Women in cybersecurity, what it really looks like, and where you can fit
|
Mar 09, 2026 |
|
Can we do Application Security with AI? An analysis of Claude Code Security.
|
Mar 03, 2026 |
|
Understanding the Cyber Resilience Act (CRA): What Software and Product Companies Need to Know
|
Feb 03, 2026 |
|
Frameworks and maturity models explained
|
Jan 07, 2026 |
|
The Reality of AppSec Risk Management using CVEs and CVSS scores
|
Dec 18, 2025 |
|
The science of security metrics
|
Dec 11, 2025 |
|
What is the cost of a Data Breach?
|
Dec 11, 2025 |
|
How to comply with CRA
|
Dec 05, 2025 |
|
OWASP ASVS, an introduction
|
Nov 27, 2025 |
|
The New OWASP TOP 10, what has changed and why.
|
Nov 20, 2025 |
|
Top Application Security Failures at Fortune 500 Companies
|
Nov 13, 2025 |
|
CVE and CVSS are broken.
|
Nov 06, 2025 |
|
Privacy Threat Modeling: Learn all about it from two experts in the field!
|
Oct 30, 2025 |
|
SAMM Assessment: Everything you need to know from industry experts
|
Oct 23, 2025 |
|
Embedding Security into the SDLC: How Sign In Solutions uses SAMMY & OWASP SAMM
|
Oct 16, 2025 |
|
An introduction to BSIMM, Building Security in Maturity Model
|
Oct 09, 2025 |
|
How to integrate ZAP into Gitlab.
|
Oct 02, 2025 |
|
Appsec case study: Attendance Radar
|
Sep 25, 2025 |
|
Defect Management Best Practices
|
Sep 11, 2025 |
|
Preparing for CRA
|
Sep 04, 2025 |
|
OWASP SAMM vs OWASP DSOMM
|
Aug 28, 2025 |
|
Introduction to OWASP DSOMM
|
Aug 21, 2025 |
|
Using ASVS with SAMM.
|
Aug 14, 2025 |
|
Software Security Requirements Explained: Why It Matters and How to Implement It Effectively
|
Aug 07, 2025 |
|
Mistakes to avoid in implementing OWASP SAMM
|
Jul 31, 2025 |
|
Stories from practical use of OWASP SAMM
|
Jul 24, 2025 |
|
How to implement ISO27001
|
Jul 17, 2025 |
|
Getting started with the Cyber Fundamentals (Cyfun) framework.
|
Jul 10, 2025 |
|
How to choose good metrics in AppSec
|
Jul 03, 2025 |
|
Introduction to the SSDLC
|
Jun 26, 2025 |
|
Implementing OWASP SAMM: A practical guide
|
Jun 19, 2025 |
|
What is FISMA and how to comply with it?
|
Jun 12, 2025 |
|
Security's Four Layers: SDLC to Information Security
|
Jun 05, 2025 |
|
Contingency planning with NIST 800-34
|
May 29, 2025 |
|
NIST 800-53: A practical guide.
|
May 23, 2025 |
|
Implementing NIST SSDF
|
May 15, 2025 |
|
OWASP SAMM a comprehensive introduction.
|
May 08, 2025 |
|
The EU Cyber Resilience Act or CRA
|
May 01, 2025 |