Application Security Weekly (Audio)  By  cover art

Application Security Weekly (Audio)

By: Security Weekly Productions
  • Summary

  • The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
    © 2024 CyberRisk Alliance
    Show more Show less
Episodes
  • Sustainable Funding of Open Source Tools - Mark Curphey, Simon Bennetts - ASW #282
    Apr 23 2024

    How can open source projects find a funding model that works for them? What are the implications with different sources of funding? Simon Bennetts talks about his stewardship of Zed Attack Proxy and its journey from OWASP to OpenSSF to an Open Source Fellowship with Crash Override. Mark Curphy adds how his experience with OWASP and the appsec community motivated him to create Crash Override and help projects like ZAP gain the support they deserve.

    Segment resources:

    • https://crashoverride.com/blog/welcome-zap-to-the-open-source-fellowship
    • https://www.zaproxy.org
    • https://crashoverride.com/blog/are-there-too-many-bubbles-of-similar-security-efforts

    CISA chimes in on the XZ Utils backdoor, PuTTY's private keys and maintaining a secure design, LeakyCLI and maintaining secure secrets in CSPs, LLMs and exploit generation, and more!

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Show Notes: https://securityweekly.com/asw-282

    Show more Show less
    1 hr and 18 mins
  • Demystifying Security Engineering Career Tracks - Karan Dwivedi - ASW #281
    Apr 15 2024

    There are as many paths into infosec as there are disciplines within infosec to specialize in. Karan Dwivedi talks about the recent book he and co-author Raaghav Srinivasan wrote about security engineering. There's an appealing future to security taking on engineering roles and creating solutions to problems that orgs face. We talk about the breadth and depth of security engineering and ways to build the skills that will help you in your appsec career.

    Segment resources:

    • https://kickstartseceng.com

    A Rust advisory highlights the perils of parsing and problems of inconsistent approaches, D-Link (sort of) deals with end of life hardware, CSRB recommends practices and processes for Microsoft, Chrome’s V8 Sandbox increases defense, and more!

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Show Notes: https://securityweekly.com/asw-281

    Show more Show less
    1 hr and 3 mins
  • Lessons That The XZ Utils Backdoor Spells Out - Farshad Abasi - ASW #280
    Apr 9 2024

    We look into the supply chain saga of the XZ Utils backdoor. It's a wild story of a carefully planned long con to add malicious code to a commonly used package that many SSH connections rely on. It hits themes from social engineering and abuse of trust to obscuring the changes and suppressing warnings. It also has a few lessons about software development, the social and economic dynamics of open source, and strategies for patching software.

    It's an exciting topic partially because so much other appsec is boring. And that boring stuff is important to get right first. We also talk about what parts of this that orgs should be worried about and what types of threats they should be prioritizing instead.

    Segment Resources:

    • https://tukaani.org/xz-backdoor/
    • https://news.risky.biz/risky-biz-news-supply-chain-attack-in-linuxland/
    • https://www.zdnet.com/article/this-backdoor-almost-infected-linux-everywhere-the-xz-utils-close-call/#ftag=RSSbaffb68
    • https://therecord.media/malicious-backdoor-code-linux-red-hat-cisa
    • https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094
    • https://duo.com/decipher/carefully-crafted-campaign-led-to-xz-utils-backdoor
    • https://boehs.org/node/everything-i-know-about-the-xz-backdoor

    OWASP leaks resumes, defining different types of prompt injection, a secure design example in device-bound sessions, turning an ASVS requirement into practice, Ivanti has its 2000s-era Microsoft moment, HTTP/2 CONTINUATION flood, and more!

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Show Notes: https://securityweekly.com/asw-280

    Show more Show less
    1 hr

What listeners say about Application Security Weekly (Audio)

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.