Application Security Weekly (Video)

Security Weekly

ASW

  • 38 minutes 40 seconds
    Random Problems, Protecting Packages, and Vulns in Designs, Defaults & Data Leaks - ASW #283

    Misusing random numbers, protecting platforms for code repos and package repos, vulns that teach us about designs and defaults, and more!

    Show Notes: https://securityweekly.com/asw-283

    30 April 2024, 9:00 pm
  • 41 minutes 11 seconds
    Why Companies Continue to Struggle with Supply Chain Security - Melinda Marks - ASW #283

    Companies deploy tools (usually lots of tools) to address different threats to supply chain security. Melinda Marks shares some of the chaos those companies still face when trying to prioritize investments, measure risk, and scale their solutions to keep pace with their development. Not only are companies still figuring out supply chain, but now they're bracing for the coming of genAI and how that will just further highlight the current struggles they're having with data security and data privacy.

    Segment Resources: Complete Survey Results: The Growing Complexity of Securing the Software Supply Chain https://research.esg-global.com/reportaction/515201781/Toc 

    Show Notes: https://securityweekly.com/asw-283

    30 April 2024, 3:56 pm
  • 38 minutes 28 seconds
    XZ & Open Source, PuTTY's Private Keys, LeakyCLI, LLMs Writing Exploits - ASW #282

    CISA chimes in on the XZ Utils backdoor, PuTTY's private keys and maintaining a secure design, LeakyCLI and maintaining secure secrets in CSPs, LLMs and exploit generation, and more!

    Show Notes: https://securityweekly.com/asw-282

    23 April 2024, 9:00 pm
  • 39 minutes 29 seconds
    Sustainable Funding of Open Source Tools - Simon Bennetts, Mark Curphey - ASW #282

    How can open source projects find a funding model that works for them? What are the implications with different sources of funding? Simon Bennetts talks about his stewardship of Zed Attack Proxy and its journey from OWASP to OpenSSF to an Open Source Fellowship with Crash Override. Mark Curphy adds how his experience with OWASP and the appsec community motivated him to create Crash Override and help projects like ZAP gain the support they deserve.

    Segment resources:

    Show Notes: https://securityweekly.com/asw-282

    23 April 2024, 3:43 pm
  • 28 minutes 12 seconds
    Arg Parsing in Rust, End of Life Hardware, CSRB & MS, Chrome’s V8 Sandbox - ASW #281

    A Rust advisory highlights the perils of parsing and problems of inconsistent approaches, D-Link (sort of) deals with end of life hardware, CSRB recommends practices and processes for Microsoft, Chrome’s V8 Sandbox increases defense, and more!

    Show Notes: https://securityweekly.com/asw-281

    16 April 2024, 9:00 pm
  • 35 minutes 17 seconds
    Demystifying Security Engineering Career Tracks - Karan Dwivedi - ASW #281

    There are as many paths into infosec as there are disciplines within infosec to specialize in. Karan Dwivedi talks about the recent book he and co-author Raaghav Srinivasan wrote about security engineering. There's an appealing future to security taking on engineering roles and creating solutions to problems that orgs face. We talk about the breadth and depth of security engineering and ways to build the skills that will help you in your appsec career.

    Segment resources:

    Show Notes: https://securityweekly.com/asw-281

    16 April 2024, 2:34 pm
  • 28 minutes 30 seconds
    OWASP Breach, Types of Prompt Injection, Device-Bound Sessions, ASVS & APIs - ASW #280

    OWASP leaks resumes, defining different types of prompt injection, a secure design example in device-bound sessions, turning an ASVS requirement into practice, Ivanti has its 2000s-era Microsoft moment, HTTP/2 CONTINUATION flood, and more!

    Show Notes: https://securityweekly.com/asw-280

    9 April 2024, 9:00 pm
  • 31 minutes 53 seconds
    Lessons That The XZ Utils Backdoor Spells Out - Farshad Abasi - ASW #280

    We look into the supply chain saga of the XZ Utils backdoor. It's a wild story of a carefully planned long con to add malicious code to a commonly used package that many SSH connections rely on. It hits themes from social engineering and abuse of trust to obscuring the changes and suppressing warnings. It also has a few lessons about software development, the social and economic dynamics of open source, and strategies for patching software.

    It's an exciting topic partially because so much other appsec is boring. And that boring stuff is important to get right first. We also talk about what parts of this that orgs should be worried about and what types of threats they should be prioritizing instead.

    Segment Resources:

    Show Notes: https://securityweekly.com/asw-280

    9 April 2024, 1:36 pm
  • 26 minutes 34 seconds
    Top 10's First Update, Metasploit's Second Update, PHP Prepares Statements, RSA & MS - ASW #279

    The OWASP Top 10 gets its first update after a year, Metasploit gets its first rewrite (but it's still in Perl), PHP adds support for prepared statements, RSA Conference puts passwords on notice while patching remains hard, and more!

    Show Notes: https://securityweekly.com/asw-279

    2 April 2024, 9:00 pm
  • 34 minutes 27 seconds
    Infosec Myths, Mistakes, and Misconceptions - Adrian Sanabria - ASW #279

    Sometimes infosec problems can be summarized succinctly, like "patching is hard". Sometimes a succinct summary sounds convincing, but is based on old data, irrelevant data, or made up data. Adrian Sanabria walks through some of the archeological work he's done to dig up the source of some myths. We talk about some of our favorite (as in most disliked) myths to point out how oversimplified slogans and oversimplified threat models lead to bad advice -- and why bad advice can make users less secure.

    Segment resources:

    Show Notes: https://securityweekly.com/asw-279

    2 April 2024, 4:12 pm
  • 36 minutes 36 seconds
    Successful Security Needs a Streamlined UX - Benedek Gagyi - ASW #278

    One of the biggest failures in appsec is an attitude that blames users for security problems. A lot of processes and workflows break down because of an insecure design or insecure defaults. Benedek Gagyi chats with us about the impact of the user experience (UX) on security and why it's not only important to understand how to make a user's life easier, but in defining who that user is in the first place.

    Segment resources:

    Show Notes: https://securityweekly.com/asw-278

    26 March 2024, 4:43 pm
  • More Episodes? Get the App
© MoonFM 2024. All rights reserved.