The Security Table

By: Izar Tarandach Matt Coles and Chris Romeo
  • Summary

  • The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!

    © 2024 The Security Table
    Show more Show less
Episodes
  • The Illusion of Secure Software
    Aug 14 2024

    In this episode of The Security Table Podcast, hosts ChriS, Izar and Matt dive into the recent statement by CISA's Jen Easterly on the cybersecurity industry's software quality problem. They discuss the implications of her statement, explore the recurring themes in security guidelines, and debate whether the core issue is with people or technology. Join the conversation as they analyze the roles of developers, QA engineers, and emerging AI tools in shaping a secure future, questioning if the industry is on the right path to real change.



    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Show more Show less
    40 mins
  • The Intersection of Hardware and Software Security
    Aug 7 2024

    In this episode of The Security Table, Chris, Izar, and Matt discuss an article that discusses threat modeling in the context of hardware. They explore the intersection of hardware and software security, the importance of understanding attack surfaces, and the challenges posed by vulnerabilities in hardware components, such as speculative execution faults and the impact of supply chain security. Join the conversation as they examine the critical points in the ongoing dialogue around hardware and software security integration.



    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Show more Show less
    30 mins
  • Computing Has Trust Issues
    Jul 31 2024

    Join us in this episode of The Security Table as we dive into the world of cybersecurity, starting with a nostalgic discussion about our favorite security-themed movies like 'Sneakers,' 'War Games,' and 'The Matrix.' We then shift gears to explore a critical topic in modern computing: the vulnerabilities and implementation issues of Secure Boot. Discover the intricate details of key management, human errors, and the challenges of maintaining trust in hardware and software systems. The conversation extends to the practicalities of password management, passkeys, and the broader implications of securing digital identities.

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Show more Show less
    46 mins

What listeners say about The Security Table

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.