Logo
    Search

    Application Security Weekly (Video)

    The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
    enSecurity Weekly Productions559 Episodes

    Episodes (559)

    The Simple Mistakes and Complex Seeds of a Vulnerability Management Program - Emily Fox - ASW #275

    The Simple Mistakes and Complex Seeds of a Vulnerability Management Program - Emily Fox - ASW #275

    The need for vuln management programs has been around since the first bugs -- but lots of programs remain stuck in the past. We talk about the traps to avoid in VM programs, the easy-to-say yet hard-to-do foundations that VM programs need, and smarter ways to approach vulns based in modern app development. We also explore the ecosystem of acronyms around vulns and figure out what's useful (if anything) in CVSS, SSVC, EPSS, and more.

    Segment resources:

    Show Notes: https://securityweekly.com/asw-275

    Creating the Secure Pipeline Verification Standard - Farshad Abasi - ASW #274

    Creating the Secure Pipeline Verification Standard - Farshad Abasi - ASW #274

    Farshad Abasi joins us again to talk about creating a new OWASP project, the Secure Pipeline Verification Standard. (Bonus points for not being a top ten list!) We talk about what it takes to pitch a new project and the problems that this new project is trying to solve. For this kind of project to be successful -- as in making a positive impact to how software is built -- it's important to not only identify the right audience, but craft guidance in a way that's understandable and achievable for that audience. This is also a chance to learn more about a project in its early days and the opportunities for participating in its development!

    Segment resources

    Show Notes: https://securityweekly.com/asw-274

    Redefining Threat Modeling - Security Team Goes on Vacation - Jeevan Singh - ASW Vault

    Redefining Threat Modeling - Security Team Goes on Vacation - Jeevan Singh - ASW Vault

    Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on Dec 13, 2022.

    Threat modeling is an important part of a security program, but as companies grow you will choose which features you want to threat model or become a bottleneck. What if I told you, you can have your cake and eat it too. It is possible to scale your program and deliver higher quality threat models.

    Segment Resources: - Original blog: https://segment.com/blog/redefining-threat-modeling/ - Open Sourced slides: https://github.com/segmentio/threat-modeling-training

    Show Notes: https://securityweekly.com/vault-asw-8

    Creating Code Security Through Better Visibility - Christien Rioux - ASW #273

    Creating Code Security Through Better Visibility - Christien Rioux - ASW #273

    We've been scanning code for decades. Sometimes scanning works well -- it finds meaningful flaws to fix. Sometimes it distracts us with false positives. Sometimes it burdens us with too many issues. We talk about finding a scanning strategy that works well and what the definition of "works well" should even be.

    Segment Resources:

    Show Notes: https://securityweekly.com/asw-273

    Starting an OWASP Project (That's Not a List!) - Grant Ongers - ASW #272

    Starting an OWASP Project (That's Not a List!) - Grant Ongers - ASW #272

    We can't talk about OWASP without talking about lists, but we go beyond the lists to talk about a product security framework. Grant shares his insights on what makes lists work (and not work). More importantly, he shares the work he's doing to spearhead a new OWASP project to help scale the creation of appsec programs, whether you're on your own or part of a global org.

    Segment Resources:

    Show Notes: https://securityweekly.com/asw-272

    Getting Your First Conference Presentation - Sarah Harvey - ASW #271

    Getting Your First Conference Presentation - Sarah Harvey - ASW #271

    We return to the practice of presentations, this time with a perspective from a conference organizer. And we have tons of questions! What makes a topic stand out? How can an old, boring topic be given new life? How do you prepare as a first-time presenter? What can conferences do to foster better presentations and new voices?

    Segment resources:

    Show Notes: https://securityweekly.com/asw-271

    Dealing with the Burden of Bad Bots - Sandy Carielli - ASW #270

    Dealing with the Burden of Bad Bots - Sandy Carielli - ASW #270

    Where apps provide something of value, bots are sure to follow. Modern threat models need to include scenarios for bad bots that not only target user credentials, but that will also hoard inventory and increase fraud. Sandy shares her recent research as we talk about bots, API security, and what developers can do to deal with these.

    Segment resources

    Show Notes: https://securityweekly.com/asw-270

    Communicating Technical Topics Without Being Boring - Eve Maler - ASW #269

    Communicating Technical Topics Without Being Boring - Eve Maler - ASW #269

    It's time to start thinking about CFPs and presentations for 2024! Eve shares advice on delivering technical topics so that an audience can understand the points you want to make. Then we show how developing these presentation skills for conferences helps with presentations within orgs and why these are useful skills to build for your career.

    Show Notes: https://securityweekly.com/asw-269

    OWASP SAMM - Software Assurance Maturity Model - Sebastian Deleersnyder - ASW Vault

    OWASP SAMM - Software Assurance Maturity Model - Sebastian Deleersnyder - ASW Vault

    We will provide a short introduction to OWASP SAMM, which is a flagship OWASP project allowing organizations to bootstrap and iteratively improve their secure software practice in a measurable way. Seba will explain the SAMM model, consisting of 15 security practices. Every security practice contains a set of activities, structured into 3 maturity levels. The activities on a lower maturity level are typically easier to execute and require less formalization than the ones on a higher maturity level. A the end we will cover how you can engage with the SAMM community and provide an overview of what happened at our latest SAMM User Day which happened on May 27th.

    Segment Resources:

    -https://www.youtube.com/channel/UCEZDbvQrj5APg5cEET49A_g

    Show Notes: https://securityweekly.com/vault-asw-6

    Making Service Meshes Work for People - Idit Levine - ASW #267

    Making Service Meshes Work for People - Idit Levine - ASW #267

    Service meshes create the opportunity to make security a team sport. They can improve observability and service identity. Turning monoliths into micro services sounds appealing, but maybe not every monolith needs to be broken up. We'll also talk about the maturity and design choices that go into service meshes and when a monolith should just remain a monolith.

    Segment Resources:

    Show Notes: https://securityweekly.com/asw-267