The Security Table
Celková doba trvání:
25 h 29 min
Skillset Over Experience: Rethinking Qualifications in Cybersecurity
The Security Table
39:53
Vibe Coding: What Could Possibly Go Wrong?
The Security Table
36:34
The Department of No
The Security Table
45:12
The Cyber Trust Mark Debate
The Security Table
47:12
Hovercrafts and the Evolution of AppSec in 2025
The Security Table
35:00
Find Your Conferences and watch Die Hard. And the Princess Bride.
The Security Table
29:12
Is it Necessary? Not everything requires an LLM
The Security Table
42:39
The STRIDE Controversy: Evolution vs. Extinction in Security Models
The Security Table
41:11
Why 100X Isn't the Answer
The Security Table
44:54
We'll Be Here Until We Become Obsolete
The Security Table
27:48
Everything is Boring
The Security Table
29:59
Experts Want to Excel
The Security Table
44:07
Numb to Data Breaches, and How it Impacts Security of the Average Feature
The Security Table
32:22
Philosophizing Cloud Security
The Security Table
28:40
Innovations in Threat Modeling?
The Security Table
31:36
The Illusion of Secure Software
The Security Table
40:18
The Intersection of Hardware and Software Security
The Security Table
30:25
Computing Has Trust Issues
The Security Table
46:09
The Stages of Grief in Incident Response
The Security Table
24:05
To SSH or Not?
The Security Table
28:08
Rethinking Security Conferences: Engagement and Innovation
The Security Table
26:04
Privacy vs. Security: Complexity at the Crossroads
The Security Table
35:48
Security, Stories, Jazz and Stage Presence with Brook Schoenfield
The Security Table
52:04
Debating the CISA Secure by Design Pledge
The Security Table
39:41
Why Developers Will Take Charge of Security, Tests in Prod
The Security Table
48:10
12 Factors of Threat Modeling
The Security Table
45:39
XZ and the Trouble with Covert Identities in Open Source
The Security Table
43:54
Nobody's Going To Mess with Our STRIDE
The Security Table
39:31
SQLi All Over Again?
The Security Table
37:55
How I Learned to Stop Worrying and Love the AI
The Security Table
42:19
Secure by Default in the Developer Toolset and DevEx
The Security Table
43:46
Debating the Priority and Value of Memory Safety
The Security Table
34:58
Selling Fear, Uncertainty, and Doubt
The Security Table
41:09
Prioritizing AppSec: A Conversation Between a VP of Eng, a Product Manager, and a Security "Pro"
The Security Table
37:09
Villainy, Open Source, and the Software Supply Chain
The Security Table
32:02
Adam Shostack -- Thinking like an Attacker and Risk Management in the Capabilities
The Security Table
46:23
Bug Bounty Theater and Responsible Bug Bounty
The Security Table
27:13
Threat Modeling Capabilities
The Security Table
41:57
Open Source Puppies and Beer
The Security Table
40:34
AppSec Resolutions
The Security Table
47:44