The Security Table
Total duration:
27 h 34 min
12 Factors of Threat Modeling
The Security Table
45:39
XZ and the Trouble with Covert Identities in Open Source
The Security Table
43:54
Nobody's Going To Mess with Our STRIDE
The Security Table
39:31
SQLi All Over Again?
The Security Table
37:55
How I Learned to Stop Worrying and Love the AI
The Security Table
42:19
Secure by Default in the Developer Toolset and DevEx
The Security Table
43:46
Debating the Priority and Value of Memory Safety
The Security Table
34:58
Selling Fear, Uncertainty, and Doubt
The Security Table
41:09
Prioritizing AppSec: A Conversation Between a VP of Eng, a Product Manager, and a Security "Pro"
The Security Table
37:09
Villainy, Open Source, and the Software Supply Chain
The Security Table
32:02
Adam Shostack -- Thinking like an Attacker and Risk Management in the Capabilities
The Security Table
46:23
Bug Bounty Theater and Responsible Bug Bounty
The Security Table
27:13
Threat Modeling Capabilities
The Security Table
41:57
Open Source Puppies and Beer
The Security Table
40:34
AppSec Resolutions
The Security Table
47:44
The Impact of Prompt Injection and HackAPrompt_AI in the Age of Security
The Security Table
64:38
Looking Back, Looking Forward
The Security Table
46:14
CVSS 4.0 Unleashed with Patrick Garrity
The Security Table
58:26
An SBOM Lifecycle
The Security Table
45:39
An SBOM Fable
The Security Table
37:17
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
The Security Table
20:09
The Future Role of Security and Shifting off the Table
The Security Table
54:58
A Show About Nothing that Turned into Something
The Security Table
33:32
The Hamster Wheel of Scan and Fix
The Security Table
56:28
Threat Modeling Conference
The Security Table
32:18
AppSec vs. ProdSec
The Security Table
37:06
Imposter Syndrome
The Security Table
34:37
The Return on Investment of Threat Modeling
The Security Table
33:49
Jim Manico ❤️ Threat Modeling: The Untold Story
The Security Table
56:19
Secure by Design
The Security Table
39:27
Security Champions as the Answer to Engineering Hating Security
The Security Table
43:54
Why Do Engineers Hate Security?
The Security Table
49:28
Security Posture is a Thing
The Security Table
44:54
Should #AppSec be Part of the Development Team?
The Security Table
37:05
Lack of Reasonable, or Everything That Is Wrong with Security Requirements
The Security Table
34:15
We Don't Know What We Don't Know
The Security Table
22:30
Privacy and the creepiness factor of collecting data
The Security Table
47:30
Security Guardrails and Paved Roads
The Security Table
42:36
Capture the Flag or NOT?
The Security Table
41:22
Simple Product Security Requirements
The Security Table
38:05