Application Security Weekly (Audio)

Toplam süre:42 h 03 min
The Human Aspect of Red Teams - Brian Fox, Tom Tovar, T. Gwyddon 'Data' Owen - ASW #379
Application Security Weekly (Audio)
73:24
Securing Software's Journey with the OWASP SPVS - Ido Geffen, Rohan Ravindranath, Cameron W., Farshad Abasi - ASW #378
Application Security Weekly (Audio)
69:50
AppSec News Roundup on Claude Code Leak, Axios NPM Compromise, Secure Design - Idan Plotnik, Raj Mallempati - ASW #377
Application Security Weekly (Audio)
68:42
Developing the Skills Needed for Modern Software Development - Keith Hoodlet, Shashwat Sehgal, Ron Rasin - ASW #376
Application Security Weekly (Audio)
75:40
Why Proactive Security Is Far Better Than Patching - Erik Nost - ASW #375
Application Security Weekly (Audio)
38:04
Creating Better Security Guidance and Code with LLMs - Mark Curphey - ASW #374
Application Security Weekly (Audio)
64:08
Making Medical Devices Secure - Tamil Mathi - ASW #373
Application Security Weekly (Audio)
63:22
Modern AppSec that keeps pace with AI development - James Wickett - ASW #372
Application Security Weekly (Audio)
47:45
Helping Users with Practical Advice to Protect their Digital Devices - Runa Sandvik - ASW #371
Application Security Weekly (Audio)
60:17
Conducting Secure Code Analysis with LLMs - ASW #370
Application Security Weekly (Audio)
46:26
Bringing Strong Authentication and Granular Authorization for GenAI - Dan Moore - ASW #369
Application Security Weekly (Audio)
69:24
Focusing on Proactive Controls in the Face of LLM-Assisted Malware - Rob Allen - ASW #368
Application Security Weekly (Audio)
67:11
Building proactive defenses that reflect the true nature of modern software risk - Paul Davis - ASW #367
Application Security Weekly (Audio)
73:15
Lessons from MongoBleed, CWE Top 25, and Secure Coding Benchmarks - ASW #366
Application Security Weekly (Audio)
44:05
Secure By Design Is Better Than Secure By Myth - Bob Lord - ASW #365
Application Security Weekly (Audio)
53:33
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
Application Security Weekly (Audio)
70:12
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363
Application Security Weekly (Audio)
66:43
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362
Application Security Weekly (Audio)
67:52
Developing Open Source Skills for Maintaining Projects - Kat Cosgrove - ASW #361
Application Security Weekly (Audio)
63:55
Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360
Application Security Weekly (Audio)
67:43
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
Application Security Weekly (Audio)
59:02
Figuring Out Where to Start with Secure Code - ASW #358
Application Security Weekly (Audio)
46:23
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
Application Security Weekly (Audio)
63:41
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
Application Security Weekly (Audio)
71:26
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
Application Security Weekly (Audio)
68:08
Quantum Computing Isn't A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
Application Security Weekly (Audio)
58:52
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
Application Security Weekly (Audio)
63:39
Inside the OWASP GenAI Security Project - Steve Wilson - ASW #352
Application Security Weekly (Audio)
67:32
Finding Large Bounties with Large Language Models - Nico Waisman - ASW #351
Application Security Weekly (Audio)
53:52
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
Application Security Weekly (Audio)
74:32
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
Application Security Weekly (Audio)
58:43
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
Application Security Weekly (Audio)
68:00
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
Application Security Weekly (Audio)
77:09
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Chris Boehm, Idan Plotnik, Josh Lemos, Michael Callahan - ASW #346
Application Security Weekly (Audio)
68:11
Translating Security Regulations into Secure Projects - Roman Zhukov, Emily Fox - ASW #345
Application Security Weekly (Audio)
73:31
Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344
Application Security Weekly (Audio)
68:17
The Future of Supply Chain Security - Janet Worthington - ASW #343
Application Security Weekly (Audio)
42:13
Uniting software development and application security - Will Vandevanter, Jonathan Schneider - ASW #342
Application Security Weekly (Audio)
58:07
How Product-Led Security Leads to Paved Roads - Julia Knecht - ASW #341
Application Security Weekly (Audio)
64:11
Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340
Application Security Weekly (Audio)
66:35