- 139
- 31 666
The Application Security Podcast
United States
เข้าร่วมเมื่อ 28 มี.ค. 2020
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Principal Application Security Architect focused on Threat Modeling at Aquia.
Matin Mavaddat -- Understanding Security as a Systemic Concern The Role of Anti Requirements
Matin Mavaddat discusses his perspective on security as a systemic concern, developed from his background in requirements engineering and systems architecture. He introduces the concept of "anti-requirements" - defining what a system should not do - and distinguishes between "syntactic security" (addressing technical vulnerabilities that are always incorrect) and "semantic security" (context-dependent security emerging from system interactions). Mavaddat shares his perspective that security itself doesn't have independent existence but rather emerges from preventing undesirable states. The discussion concludes with practical implementation strategies, suggesting that while automated tools can handle syntactic security issues, organizations should focus more energy on semantic security by understanding business context and defining anti-requirements early in the development process.
Mentioned in this episode:
Matin’s article: www.linkedin.com/pulse/reframing-security-unveiling-power-anti-requirements-matin-mavaddat/
Books:
Systems Thinking for Curious Managers by Russell Ackoff
www.triarchypress.net/curious.html
Antifragile by Nassim Nicholas Taleb
www.penguinrandomhouse.com/books/176227/antifragile-by-nassim-nicholas-taleb/
The Black Swan by Nassim Nicholas Taleb
www.penguinrandomhouse.com/books/176226/the-black-swan-second-edition-by-nassim-nicholas-taleb/
Mentioned in this episode:
Matin’s article: www.linkedin.com/pulse/reframing-security-unveiling-power-anti-requirements-matin-mavaddat/
Books:
Systems Thinking for Curious Managers by Russell Ackoff
www.triarchypress.net/curious.html
Antifragile by Nassim Nicholas Taleb
www.penguinrandomhouse.com/books/176227/antifragile-by-nassim-nicholas-taleb/
The Black Swan by Nassim Nicholas Taleb
www.penguinrandomhouse.com/books/176226/the-black-swan-second-edition-by-nassim-nicholas-taleb/
มุมมอง: 197
วีดีโอ
Kayra Otaner -- DevSecOps
มุมมอง 10921 วันที่ผ่านมา
Kayra Otaner joins the podcast today to discuss DevSecOps and answer the question, is it dead? Kayra is the Director of DevSecOps at Roche and is highly involved in the DevSecOps community. Kayra states that DevSecOps in its traditional form is “dead” and that each organization should approach its needs based on their size. Otaner introduces the concept of "security as code" and "policy as code...
François Proulx -- Arbitrary Code Execution 0-day in Build Pipeline of Popular Open Source Packages
มุมมอง 9928 วันที่ผ่านมา
François Proulx shares his discovery of security vulnerabilities in build pipelines. Francois has found that attackers can exploit this often overlooked side of the software supply chain. To help address this, his team developed an open source scanner called Poutine that can identify vulnerable build pipelines at scale and provide remediation guidance. Francois has over 10 years of experience i...
OWASP Candidate Board of Directors Debate for 2024
มุมมอง 69หลายเดือนก่อน
OWASP, we proudly announce the second annual Board of Directors Candidate debate! We invited all six candidates, but only two could attend (or even respond to our emails/Slack messages). Please tune in to hear Adeel and Ricardo's thoughts on the board priorities, the future of OWASP, and what to expect if they are elected. And then get out and vote!
Steve Wilson -- The Developer's Playbook for Large Language Model Security Building Secure AI Appli
มุมมอง 148หลายเดือนก่อน
Steve Wilson, the author of 'The Developer's Playbook for Large Language Model Security’ is back to dive into topics from his book like AI hallucinations, trust, and the future of AI. Steve has been at the forefront of the explosion of activity at the intersection of AppSec, LLM, and AI. We discuss the biggest fears surrounding LLMs and AI, and explore advanced concepts like Retrieval Augmented...
Jeff Williams -- Application Detection & Response ADR
มุมมอง 301หลายเดือนก่อน
Jeff Williams, a renowned pioneer in the field of application security is with us to discuss Application Detection and Response (ADR), detailing its potential to revolutionize security in production environments. Jeff shares stories from his career, including the founding of OWASP, and his take on security assurance. We cover many topics including; security assurance, life, basketball and plent...
Phillip Wylie -- Pen Testing from Somebody Who Knows About Pen Testing
มุมมอง 1232 หลายเดือนก่อน
Philip Wiley shares his unique journey from professional wrestling to being a renowned pen tester. We define pen testing and the role of social engineering in ethical hacking. We talk tools of the trade, share a favorite web app pentest hack and offer good advice on starting a career in cybersecurity. Philip shares some insights from his book, ‘The Pentester Blueprint: Starting a Career as an E...
Steve Springett -- Software and System Transparency
มุมมอง 1422 หลายเดือนก่อน
Steve Springett, an expert in secure software development and a key figure in several OWASP projects is back. Steve unpacks CycloneDX and the value proposition of various BOMs. He gives us a rundown of the BOM landscape and unveils some new BOM projects that will continue to unify the security industry. Steve is a seasoned guest of the show so we learn a bit more about Steve's hobbies, providin...
Irfaan Santoe -- The Power of Strategy in AppSec
มุมมอง 1693 หลายเดือนก่อน
Irfaan Santoe joins us for an in-depth discussion on the power of strategy in Application Security. We delve into measuring AppSec maturity, return on investment, and communicating technical needs to business leaders. Irfaan shares his unique journey from consulting to becoming an AppSec professional, and addresses the gaps between CISOs and AppSec knowledge. Irfaan shares valuable insights for...
Andrew Van Der Stock -- The New OWASP Top Ten
มุมมอง 2093 หลายเดือนก่อน
Andrew Van Der Stok, a leading web application security specialist and executive director at OWASP joins us for this episode. We discuss the latest with the OWASP Top 10 Project, the importance of data collection, and the need for developer engagement. Andrew gives us the methodology behind building the OWASP Top 10, the significance of framework security, and much more. Previous episodes with ...
Derek Fisher -- Hiring in Cyber AppSec
มุมมอง 1824 หลายเดือนก่อน
Derek Fisher, an expert in hardware, software, and cybersecurity with over 25 years of experience is back on the podcast. Derek shares his advice on cybersecurity hiring, specifically in application security, and dives into the challenges of entry-level roles in the industry. We discuss the value of certifications, the necessity of lifelong learning, and the importance of networking. Listen alo...
Tanya Janca -- Secure Guardrails
มุมมอง 2964 หลายเดือนก่อน
Tanya Janka, also known as SheHacksPurple, discusses secure guardrails, the difference between guardrails and paved roads, and how to implement both in application security. Tanya is an award-winning public speaker and head of education at SEMGREP and the best-selling author of ‘Alice and Bob Learn Application Security’. Tanya shares her insights on creating secure software and teaching develop...
Jahanzeb Farooq -- Launching and Executing an AppSec Program
มุมมอง 2374 หลายเดือนก่อน
Jahanzeb Farooq discusses his journey in cybersecurity and the challenges of building AppSec programs from scratch. Jahanzeb shares his experience working in various industries, including Siemens, Novo Nordisk, and Danske Bank, highlighting the importance of understanding developer needs and implementing the right tools. The conversation covers the complexities of cybersecurity in the pharmaceu...
David Quisenberry -- Building Security, People, and Programs
มุมมอง 1275 หลายเดือนก่อน
David Quisenberry shares about his journey into the security world, insights on building AppSec programs in small to mid-sized companies, and the importance of data-driven decision-making. The conversation delves into the value of mentoring and why it's important to build real relationships with the people you work with, the vital role of trust with engineering teams, and the significance of me...
Matt Rose -- Software Supply Chain Security Means Many Different Things to Different People
มุมมอง 1275 หลายเดือนก่อน
Matt Rose, an experienced technical AppSec testing leader discusses his career journey and significant contributions in AppSec. The conversation delves into the nuances of software supply chain security and exploring how different perceptions affect its understanding. Matt provides insights into the XZ compromise, critiques the buzzword 'shift left,' and discusses the role of digital twins and ...
James Berthoty -- Is DAST Dead? And the future of API security
มุมมอง 7605 หลายเดือนก่อน
James Berthoty Is DAST Dead? And the future of API security
Mark Curphey and Simon Bennetts -- Riding the Coat Tails of ZAP, without Open Source Funding
มุมมอง 1506 หลายเดือนก่อน
Mark Curphey and Simon Bennetts Riding the Coat Tails of ZAP, without Open Source Funding
Dustin Lehr -- Culture Change through Champions and Gamification
มุมมอง 1347 หลายเดือนก่อน
Dustin Lehr Culture Change through Champions and Gamification
Francesco Cipollone -- Application Security Postures Management and Working with the Business
มุมมอง 1657 หลายเดือนก่อน
Francesco Cipollone Application Security Postures Management and Working with the Business
Mukund Sarma -- Developer Tools that Solve Security Problems
มุมมอง 2257 หลายเดือนก่อน
Mukund Sarma Developer Tools that Solve Security Problems
Meghan Jacquot -- Assumed Breach Red Team Engagements for AppSec
มุมมอง 878 หลายเดือนก่อน
Meghan Jacquot Assumed Breach Red Team Engagements for AppSec
Bill Sempf -- Development, Security, and Teaching the Next Generation
มุมมอง 748 หลายเดือนก่อน
Bill Sempf Development, Security, and Teaching the Next Generation
Hendrik Ewerlin -- Threat Modeling of Threat Modeling
มุมมอง 1928 หลายเดือนก่อน
Hendrik Ewerlin Threat Modeling of Threat Modeling
Jason Nelson -- Three Pillars of Threat Modeling Success: Consistency, Repeatability, and Efficacy
มุมมอง 1508 หลายเดือนก่อน
Jason Nelson Three Pillars of Threat Modeling Success: Consistency, Repeatability, and Efficacy
Erik Cabetas - Cracking Codes on Screen and in Contests: Hacking, Vulnerabilities, & Evolution of...
มุมมอง 1319 หลายเดือนก่อน
Erik Cabetas - Cracking Codes on Screen and in Contests: Hacking, Vulnerabilities, & Evolution of...
Justin Collins -- Enabling the Business to Move Faster, Securely
มุมมอง 2159 หลายเดือนก่อน
Justin Collins Enabling the Business to Move Faster, Securely
Kyle Kelly -- The Dumpster Fire of Software Supply Chain Security
มุมมอง 3119 หลายเดือนก่อน
Kyle Kelly The Dumpster Fire of Software Supply Chain Security
Jay Bobo & Darylynn Ross -- App Sec Is Dead. Product Security Is the Future.
มุมมอง 52310 หลายเดือนก่อน
Jay Bobo & Darylynn Ross App Sec Is Dead. Product Security Is the Future.
I can resonate with anti-requirements and holistic systems-level security thinking. Great chat!
Can Unified Vulnerability Management Systems function as an ASPM? My thought is no, but I'm curious of what you think
This is quality content
Important topic! Steve has clearly done great work on CycloneDX and Dependency-Track - much appreciated by the community. However, in this interview, I don't believe that he adequately motivated a key use case for SBOM. Here is my attempt: Imagine that you are a CISO and a major vulnerability is released and becomes a global news story. The CIO approaches the CISO with the concern "are we affected by this vulnerability?". At present, many CISOs will have to redirect precious resources to commence a slow, largely manual, process of examining hundreds, or even thousands, of their IT solutions to provide the answers. The goal is for the CISO to always have a complete and current library of SBOMs for all enterprise IT assets, and commitments from their solution providers to rapidly provide VEX reports in response to vulns. If so, there are SBOM solutions (some appear on the site "SBOM.Solutions") that the CISO can use to answer the CIO's question very quickly, and with minimal effort. And if there is exposure, the CISO will know exactly which solution require remediation to minimize the time window for exploitation. Right Steve?
I really appreciate this podcast and I hope it goes on for a long time. It is really good stuff
Thanks for having me on your podcast! It was great chatting with you guys!
Great content! Thx for sharing your experience. I picked up Derek’s book and am looking forward to reading it.
Thank you so much for having me on! Really great discussions!
Great video gentlemen!
Great conversation 🙂 There is a Bachelors degree in Cybersecurity that Western Governors University (WGU) offers. I have it myself. It's a Bachelors of Science Cybersecurity and Information Assurance (BSCIA). They also offer a masters degree. This degree comes with multiple certifications as part of the course work including ISC2 SSCP, CCSP. It does not help with getting a job. I got into product security by having technical skills. Progression: Grocery store stocker, printer repair/salesman (after hours web master and custom ecomm creator for the company), higher ed desktop support, connected vehicle qa engineer -> devsecops engineer, real estate product security analyst->engineer->senior.
Great conversation! Thanks for having me on.
give timelines .
Chris, awesome podcast. In the introductions, the sound is only coming from the left channel (meaning the listeners can hear the sound coming through left ear). When the conversation starts, it becomes ok. I have observed this in a few podcasts.
You guys can't imagine relief I felt on hearing the AI rebuttal at min 41, I work in sales and always think this but can never say it. Another brilliant episode! Thanks gents
Why not do something like Wikipedia? A full on donation campaign every single year with a clear goal? So people know what the goal is and how much of the quota is met. I think that could intice more people to contribute.
This was a brilliant conversation Gents! Thanks for the insights. Greetings from London
Where can we learn to become a prod sec?
great to see Francesco cipollone speaking more and talking ASPM sharing a different perspective on the subject
Absolutely a pleasure 🙏🏻
amazing great podcast. well done
how did you find that password?
your videos are fantastic.. but have some issues and need SEO. then it will give you good results.. also you get a targeted audience.
I'm a purist when it comes to cybersecurity. Went from college to vuln management to appsec, and I feel the same. Product security needs to be the focus from architect to dev to devops to qa even. Appsec can probably be consultative, but I would even say that's more of a service to product security. There's far too few of us, but there are tons of product resources (ie qa, dev, architects, etc) who with just the right education in their respective area, can achieve more. Then it would just be pentesting and consulting from the purist who is cybersecurity
I said to myself "I got lucky" to have caught this on a Friday evening. Should have a ton more likes & comments - inspirational knowledge. Thank you all.
Great video! Eitan is an AppSec pioneer and what he is doing with Mobb is an incredible advancement for appsec!
Excellent guest and the ending was hilarious🤣
Wow wonderful video. All the videos on your channel are fantastic. But your video views are lower. Because your optimization is very poor. Your optimization needs to improve as soon as possible.,...
Verry nice video Sir
14:09 With the amount of GPUs deployed for AI, you can use all that compute time to crack every private key for BTC just by brute force iterating through the bits. 😅 Okay, maybe not that feasible but those H100 accelerators are pretty fast and can parallelize a lot of compute. 😊😅
11:10 - imagine if stdio.h had a vulnerability. 🤣😓🤪
Back in the day your build environment was sanitized and under configuration management. These days with so much dependencies on external packages it is a different world these days.
Wow what an episode. Thank you all for this
The letter of the law but not the spirit.... This is amazing and exactly the way to phrase this.
verry nice video sir
Wow wonderful video. All the videos on your channel are fantastic. But your video views are lower. Because your optimization is very poor. Your optimization needs to improve as soon as possible.,..................,,
Wow what an episode! Thanks for this
I know that's unrelated but Tanya would do a great Amy Winehouse impersonation
Hello, The Application Security Podcast. Just now I visited your channel. Your content is so excellent. But here is a problem: your video SEO score is too weak. That's why your channel is not growing. If you increase your video SEO score then your channel will get an active audience organically. If you want I can help you. Error we found in your TH-cam channel: 1. Title 2. Tags 3. Description 4. End Screens Our Services: 1. TH-cam Channel Optimization 2. TH-cam Video SEO 3. TH-cam Video Promotion 4. TH-cam Channel Monetization Regards, Akash Sarkar CEO at Zillion Ten Agency Digital Marketing, Lead Generation And TH-cam Expert.
Thank you for doing this!
Nice Steve! 👏👏👏
Would love to hear your views on replacing WAF for cloud native apps and plugging the capability gap with CSP native WAF. Is RASP the future or does following good testing and configuration that you describe remove the need? Also the value of tools like Aquasec.
(This is Chris). I'm not a fan of WAF at all these days. The time and $$$ commitment is too much for the reward. RASP is the present and the future. You should also perform good testing and configuration; this is a classic defense in-depth approach. Tools like Aquasec provide another layer of defense, managing container security configs and open source / third-party vulns.
(This is Steve). Having formerly worked for Aqua I also like their tools and their open source in particular. I'm with Chris in terms of WAF however I do like it in terms of virtual patching (eg Log4j). IMHO RASP or anything that requires an in-depth attachment to runtime engines can be difficult to operationalise. From a cloud AppSec perspective, given the potential ephemeral nature of containerised application components and the complexity of a microservice / serverless architecture, it can be a chore. I do entirely agree with the goal of RASP and see that level of observability and actionability with reachability as a critical objective to bring context, a definite future goal. I'm not 100% convinced that current RASP is the answer but perhaps a next-gen "RASP" leveraging tech like eBPF (and obviously AI) is an emerging and potentially more performant option. Sorry for the late response.
Promo-SM
Really enjoy your videos
Thanks for having me on!
For all appsec engineers and cybersecurity enthusiasts this podcast is full of important insights ❤🎉 glad i found this podcast channel
Very insightful interview! Tony 🔝
What a great talk! Thanks for sharing all this knowledge!
I will definitely pick up this book. I've been the solo appsec analyst at my company and tasked to build out the program. It's daunting. Finally have a 2nd analyst to work alongside
This book will serve you well in growing your focus and your AppSec program.
Good
very great discussion