Episodios

  • The Illusion of Secure Software
    Aug 14 2024

    In this episode of The Security Table Podcast, hosts ChriS, Izar and Matt dive into the recent statement by CISA's Jen Easterly on the cybersecurity industry's software quality problem. They discuss the implications of her statement, explore the recurring themes in security guidelines, and debate whether the core issue is with people or technology. Join the conversation as they analyze the roles of developers, QA engineers, and emerging AI tools in shaping a secure future, questioning if the industry is on the right path to real change.



    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Más Menos
    40 m
  • The Intersection of Hardware and Software Security
    Aug 7 2024

    In this episode of The Security Table, Chris, Izar, and Matt discuss an article that discusses threat modeling in the context of hardware. They explore the intersection of hardware and software security, the importance of understanding attack surfaces, and the challenges posed by vulnerabilities in hardware components, such as speculative execution faults and the impact of supply chain security. Join the conversation as they examine the critical points in the ongoing dialogue around hardware and software security integration.



    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Más Menos
    30 m
  • Computing Has Trust Issues
    Jul 31 2024

    Join us in this episode of The Security Table as we dive into the world of cybersecurity, starting with a nostalgic discussion about our favorite security-themed movies like 'Sneakers,' 'War Games,' and 'The Matrix.' We then shift gears to explore a critical topic in modern computing: the vulnerabilities and implementation issues of Secure Boot. Discover the intricate details of key management, human errors, and the challenges of maintaining trust in hardware and software systems. The conversation extends to the practicalities of password management, passkeys, and the broader implications of securing digital identities.

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Más Menos
    46 m
  • The Stages of Grief in Incident Response
    Jul 24 2024

    Join Chris, Izar, and Matt as they sit around the Security Table to dissect and discuss the different stages of dealing with security incidents. In this episode, they explore the developer's stages of grief during an incident, and discuss a recent large-scale IT incident. They share insights from their multi-decade experience in security, analyze the fragility of current systems, and discuss the role of luck and probability in security failures.

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Más Menos
    24 m
  • To SSH or Not?
    Jul 17 2024

    In this episode of 'The Security Table,' we are back from our midsummer break to discuss OpenSSH regression vulnerability. We dig into the nuances of this race condition leading to remote code execution, explore the chain of security updates, and the role of QA in preventing such regressions. We debate the necessity of SSH in modern cloud-native environments and its alternatives. Plus, we answer the critical question of who should catch these vulnerabilities first — QA teams, pentesters, or automated tools?



    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Más Menos
    28 m
  • Rethinking Security Conferences: Engagement and Innovation
    Jul 3 2024

    In this episode Chris, Matt, and Izar discuss the current state of security conferences and gatherings for professionals in the field. They discuss the value and viability of different types of gatherings, the importance of networking and community-building at events, innovative approaches to conference formats and the need for something more engaging and participatory that caters to both introverts and extroverts.

    Personal experiences and preferences for conference attendance and speaking engagements are discussed along with hybrid approaches that combine presentations with facilitated discussions and interactive elements.

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Más Menos
    26 m
  • Privacy vs. Security: Complexity at the Crossroads
    Jun 18 2024

    In this episode of the Security Table, Chris, Izar, and Matt delve into the evolving landscape of cybersecurity. The episode has a humorous start involving t-shirts and Frogger as a metaphor for the cybersecurity journey, the conversation shifts to the significant topic of cybersecurity being at a crossroads as suggested by a CSO Online article.

    They explore the concept of moving from a product-centric to an architectural-centric approach in cybersecurity, discussing the design and integration of inherent capabilities rather than relying on add-on products. The hosts look into the complexities of security and privacy, analyzing their intersections, the challenges of privacy threat modeling, and the importance of understanding the broader ecosystem in which data interacts. The episode concludes with a lively discussion on the evolving nature of security and privacy regulations, the impact of complexity, and the need for continuous threat modeling.

    Article mentioned in this episode:
    Cybersecurity at a crossroads: Time to shift to an architectural approach

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Más Menos
    36 m
  • Security, Stories, Jazz and Stage Presence with Brook Schoenfield
    Jun 4 2024

    In this episode of 'The Security Table,' hosts Chris Romeo, Izar Tarandach, and Matt Coles are joined by Brook Schoenfield, a seasoned security professional, to share insights and stories from his extensive career.

    The conversation covers Brook's experience in writing books on security, lessons learned from his 40-year career, and personal anecdotes about his life as a musician, including playing with legends like Bo Diddley and Chuck Berry. Brook highlights the importance of ensemble work in both security and music.


    Books written by Brook Schoenfield:

    Secrets Of A Cyber Security Architect (Auerbach, 2019) https://brookschoenfield.com/?page_id=331

    Securing Systems: Applied Security Architecture https://brookschoenfield.com/?page_id=245

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Más Menos
    52 m