The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans, each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a solid dose of humor and anecdotes.
…
  continue reading
AppSec Podcasts
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
  continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
  continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
  continue reading
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizations of all sizes with their cybersecurity needs. If you’re an AppSec professional looking for an opportunity to work with some of the best in the  ...
…
  continue reading
AppSec Builders features practical and actionable conversations with application security experts and practitioners. Topics range from understanding and solving classes of vulnerability, building protections to efficiently scale with your business, and core best practices to strengthen your security posture. AppSec Builders is hosted by Jb Aviat, AppSec staff engineer at Datadog, former CTO and co-founder at Sqreen and Apple Red Team member. Contact us at [email protected]
…
  continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast, and so are the conversations that shape it. Welcome to The Security Champions Podcast, the go-to resource for insights from the front lines of application security. The podcast is cohosted by Michael Burch, Director of Application Security for Security Journey, and Dustin Lehr, the Director of AppSec Advocacy. Each month, one of them shares a candid conversation with security leaders, engineering voic ...
…
  continue reading
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot  ...
…
  continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
  continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.
…
  continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
  continue reading
The Future of Application Security is a podcast for ambitious leaders who want to build a modern and effective AppSec program. Doing application security right is really hard and we want to help other experts build the future of AppSec by curating the best industry insights, tips and resources. What’s the most important security metric to measure in 2024? It’s Mean Time to Remediate (MTTR). Download our new MTTR guide: https://lnkd.in/evjcf4Vt
…
  continue reading
The API Hour is your front-row seat to where APIs meet InfoSec. Hosted by Dan Barahona and brought to you by APIsec University, each episode dives into real-world breaches, testing tactics, and the tools shaping AppSec. Whether you're building, breaking, or securing APIs, you'll get practical insights from the experts redefining API security. Plug in, lock down, and decode what’s really going on behind the APIs—because in a connected world, security is everything.
…
  continue reading
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
…
  continue reading
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at Informa TechTarget.
…
  continue reading
Working in cybersecurity can lead to many restless nights worrying about the safety of your applications. But don’t let software insecurity get you down – we’re here to help you take back your sleep. World-renowned software security evangelists will join our Checkmarx experts Stephen Gates and Matt Slotten to get inside the minds of cyber attackers. Our conversations will be packed with insight into the latest software threats and best practices for maturing your application security program ...
…
  continue reading
SC Media and F5 are proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
  continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
  continue reading
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
…
  continue reading
SC Media is proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
  continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, and software supply chain security. Hosted by Paul Roberts, director of editorial and content at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
  continue reading
Broadcasting Ideas and Connecting Minds at the Intersection of Cybersecurity, Technology and Society. Founded by Sean Martin and Marco Ciappelli in 2015, ITSPmagazine is a multimedia platform exploring how technology, cybersecurity, and society shape our world. For over a decade, we've recognized this convergence as one of the most defining forces of our time—and it's more critical than ever. Our global community encourages intellectual exchange, challenging assumptions and diving deep into  ...
…
  continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
  continue reading
I'm always fascinated by new technology, especially AI. One of my biggest regrets is not taking AI electives during my undergraduate years. Now, with consumer-grade AI everywhere, I’m constantly discovering compelling use cases far beyond typical ChatGPT sessions. As a tech founder for over 22 years, focused on niche markets, and the author of several books on web programming, Linux security, and performance, I’ve experienced the good, bad, and ugly of technology from Silicon Valley to Asia. ...
…
  continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
  continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
  continue reading
A technology focused podcast - Talks about the business, people, technology, products, culture of silicon valley - with a security twist.
…
  continue reading
Featuring guests from around the world and builders of some of the most exciting technologies on earth, join us as we explore the world of innovation and technology and what we need to do as engineers to keep it safe and secure.
…
  continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
  continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
  continue reading
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
…
  continue reading

1
Conducting the AppSec Symphony: From Noise to ASPM Harmony
27:24
27:24
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
27:24Application security posture management (ASPM) has become a crucial pillar of AppSec programs by aggregating, correlating, and prioritizing vulnerability reports arriving from various testing tools. In this episode of AppSec Serialized, Cenk Kalpakoğlu, founder of Kondukto, joins hosts Dan and Ryan to discuss the evolution of ASPM, how Invicti and …
…
  continue reading

1
How GitHub Code Quality connects to AppSec
22:22
22:22
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
22:22It's our first on-location episode! At GitHub Universe, Katie Norton, Research Manager for IDC's DevSecOps and software supply chain security practice, explains how a new extension to GitHub's CodeQL reflects increased awareness of security as a dimension of code quality. She also discusses the shifting strategic partnerships and competition that c…
…
  continue reading

1
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring —  Episode 4 | A Musing On the Future of Cybersecurity ...
3:38
3:38
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
3:38Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself. This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity. 🔍 In this episode: A 188% surge in malicious open-source packages (Sonatype 2025) 30% of 2024 cyberattacks…
…
  continue reading

1
LLM Vulnerabilities and Prompt Injection: AppSec News Deep Dive | The AppSec Insiders Podcast Ep.19
28:36
28:36
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
28:36In this episode, we explore the emerging security risks of AI and LLMs in modern applications. Iman shares real-world experiences bypassing AI guardrails like LlamaGuard and OpenAI Shield, while the team discusses prompt injection attacks, system prompt exposure, excessive agency vulnerabilities, and data poisoning. Learn about the OWASP Top 10 for…
…
  continue reading
In this episode, Seth and Ken debate OpenAI's Atlas browser, which embeds AI into web browsing. Ken views it as a major privacy concern, potentially accelerating invasive data collection and surveillance. Seth noted that new browsers historically have critical flaws. They acknowledged that AI is very useful for generic and technical internet search…
…
  continue reading

1
Brad Geesaman - Redefining AppSec with AI: Shrinking Toil, Expanding Impact - How LLMs are able to reduce toil in triage-heavy AppSec workflows
42:19
42:19
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
42:19Brad Geesaman, Principal Security Engineer at Ghost, joins the podcast today to explore how AI and large language models are transforming the world of application security. The discussion starts with the concept of "toil"—the repetitive, exhausting work that drains AppSec teams as they struggle to keep up with mountains of security findings and ale…
…
  continue reading

1
How to Stay Resilient When Cybercrime Becomes Your Competition | A Conversation with Author and Former FBI Agent, Eric O'Niell | Redefining CyberSecurity with Sean Martin
40:24
40:24
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
40:24⬥GUEST⬥ Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com …
…
  continue reading

1
How to Stay Resilient When Cybercrime Becomes Your Competition | A Conversation with Author and Former FBI Agent, Eric O'Niell | Redefining CyberSecurity with Sean Martin
40:24
40:24
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
40:24⬥GUEST⬥ Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com …
…
  continue reading

1
New Book | STREAMING WARS: How Getting Everything We Want Changed Entertainment Forever | Journalist Charlotte Henry Explains How Streaming Changed Entertainment Forever | Redefining Society And Technology ...
34:21
34:21
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
34:21____________Podcast Redefining Society and Technology Podcast With Marco Ciappelli https://redefiningsocietyandtechnologypodcast.com ____________Host Marco Ciappelli Co-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybe…
…
  continue reading

1
Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx
29:34
29:34
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
29:34Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx In this episode of the Security Repo Podcast, François Proulx, VP of Security Research at Boost Security, discusses the evolving threats in software supply chain security, particularly focusing on attacks targeting CI/CD pipelines. He explains how open source tools li…
…
  continue reading

1
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring —  Episode 4 | A Musing On the Future of Cybersecurity ...
3:38
3:38
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
3:38Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself. This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity. 🔍 In this episode: A 188% surge in malicious open-source packages (Sonatype 2025) 30% of 2024 cyberattacks…
…
  continue reading

1
Quantum Computing Isn't A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
  continue reading

1
Quantum Computing Isn't A Threat To Blockchains - Yet - Sandy Carielli, Martha Bennett - ASW #354
58:52
58:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
  continue reading

1
Quantum Computing Isn't A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
  continue reading

1
Halloween over Florence: THE MARKET OF GHOSTS | A Short Story Written By Marco Ciappelli (English Version) | Stories Sotto Le Stelle Podcast | Short Stories For Children And The Young At Heart
13:02
13:02
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
13:02Halloween over Florence: THE MARKET OF GHOSTS Severino lived in the bell tower on the hill — the one next to the ancient Basilica of San Miniato al Monte. Every evening, at sunset, he would lock the gate at the base of the entrance stairway and before climbing back up, he would pause to watch Florence color itself amber. And so he did today as well…
…
  continue reading

1
Splunk exec on AI observability's "double-edged sword"
15:45
15:45
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
15:45Patrick Lin from Splunk discusses how observability extends beyond IT, highlighting its importance in improving business decisions, customer support, and revenue. The interview also covers challenges in enterprise observability, like standardization and teamwork, along with the changing role of AI in observability methods. AI automation can help ob…
…
  continue reading

1
Fighting Tool Squatting And Prompt Injection & The Security Gaps In MCP – Srajan Gupta
23:41
23:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
23:41In this episode of the Security Repo Podcast, we welcome Srajan Gupta, a security engineer exploring the evolving security implications of Model Context Protocol (MCP) servers. Shrojan breaks down how MCPs act as AI connectors to external systems and the alarming rise in attack surfaces, including tool squatting and indirect prompt injections. The …
…
  continue reading
We’re debating an online article claiming that the CIA Triad (Confidentiality, Integrity, Availability) is a relic and needs to be updated for 21st-century threats. The discussion includes whether new properties like authenticity, accountability, and resilience should be incorporated into modern security models. And we delve into the use of analogi…
…
  continue reading

1
New Book: SPIES, LIES, AND CYBER CRIME | Former FBI Spy Hunter Eric O'Neill Explains How Cybercriminals Use Espionage techniques to Attack Us | Redefining Society And Technology Podcast With Marco Ciappelli ...
48:16
48:16
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
48:16____________Podcast Redefining Society and Technology Podcast With Marco Ciappelli https://redefiningsocietyandtechnologypodcast.com ____________Host Marco Ciappelli Co-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybe…
…
  continue reading

1
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
1:03:39
1:03:39
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:03:39Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
…
  continue reading

1
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
1:03:39
1:03:39
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:03:39Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
…
  continue reading

1
Sampling, Stealing, or Something Else Entirely: Who Gets the Credit When AI Creates the Song? | A Conversation with  Marco Ciappelli | Music Evolves with Sean Martin
29:57
29:57
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
29:57Guest and Host Guest: Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.com Host: Sean Martin, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: https://www.seanmartin.com/ Show Notes In this candid episode of Music Evolves, Sean Marti…
…
  continue reading

1
Cribl CEO talks AI data management, MCP and AI bubble
23:56
23:56
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
23:56Observability and security company Cribl has had a front-row seat to the rise of generative AI, AI agents, and their impact on data management in IT. The company, which grew from log management into federated search, a data pipeline, a data lake, and a cloud-based managed service, also expanded its product offerings this week with notebooks for obs…
…
  continue reading

1
From Sampling to Scraping: AI Music, Rights, and the Return of Creative Control | A Musing On The Connection Between Music, Technology, and Creativity | Music Evolves: Sonic Frontiers with Sean Martin ...
10:18
10:18
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
10:18Show Notes In this episode, we unpack the core ideas behind the Sonic Frontiers article “From Sampling to Scraping: AI Music, Rights, and the Return of Creative Control.” As AI-generated music floods streaming platforms, rights holders are deploying new tools like neural fingerprinting to detect derivative works — even when no direct sampling occur…
…
  continue reading

1
The Silent Risk in AI-Powered Business Automation: Why No-Code Needs Serious Oversight | A Conversation with Walter Haydock | Redefining CyberSecurity with Sean Martin
38:21
38:21
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
38:21⬥GUEST⬥ Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/ ⬥HOST⬥ Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ No-Code Meets AI: Who’s Really in Control? As A…
…
  continue reading

1
The Silent Risk in AI-Powered Business Automation: Why No-Code Needs Serious Oversight | A Conversation with Walter Haydock | Redefining CyberSecurity with Sean Martin
38:21
38:21
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
38:21⬥GUEST⬥ Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/ ⬥HOST⬥ Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ No-Code Meets AI: Who’s Really in Control? As A…
…
  continue reading

1
Dustin Lehr & Michael Burch - Security Champions Summit Recap
43:56
43:56
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
43:56In this episode of The Security Champions Podcast, hosts Dustin Lehr and Michael Burch discuss the recent success of the first annual Security Champions Summit. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Podcast sponsored by Security Journey, Secure Coding Training for Developers and Everyone in the SDLC. Learn more at securityjourney.com. FOLLOW US to s…
…
  continue reading

1
Beyond the Title: What It Really Takes to Be a CISO Today — Insights Following A Conversation with Solarwinds CISO, Tim Brown | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read ...
8:26
8:26
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:26What does it really take to be a CISO the business can rely on? In this episode, Sean Martin shares insights from a recent conversation with Tim Brown, CISO at SolarWinds, following his keynote at AISA CyberCon and his role in leading a CISO Bootcamp for current and future security leaders. The article at the heart of this episode focuses not on te…
…
  continue reading

1
Beyond the Title: What It Really Takes to Be a CISO Today — Insights Following A Conversation with Solarwinds CISO, Tim Brown | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read ...
8:26
8:26
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:26What does it really take to be a CISO the business can rely on? In this episode, Sean Martin shares insights from a recent conversation with Tim Brown, CISO at SolarWinds, following his keynote at AISA CyberCon and his role in leading a CISO Bootcamp for current and future security leaders. The article at the heart of this episode focuses not on te…
…
  continue reading

1
Fixing Hiring, Fostering Diversity, and Finding Your Place in Security – Matt Torbin
19:15
19:15
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
19:15In this episode of the Security Repo Podcast, we sit down with Matt Torbin to explore his inspiring journey from jazz musician to cybersecurity advocate and leader. We dive deep into the origins and impact of Day of Shecurity, a one-day conference aimed at increasing representation and mentorship for women and non-binary individuals in infosec. Mat…
…
  continue reading

1
First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli
26:54
26:54
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
26:54First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli AISA CyberCon Melbourne | October 15-17, 2025 Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security opera…
…
  continue reading

1
First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli
26:54
26:54
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
26:54First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli AISA CyberCon Melbourne | October 15-17, 2025 Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security opera…
…
  continue reading

1
OWASP Candidate Debate - 2025 Edition
1:08:09
1:08:09
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:08:09In this special episode of the Application Security Podcast we meet nine of the OWASP Board of Directors candidates. Each candidate discusses their unique qualifications, experiences, and vision for OWASP's future. Topics include enhancing OWASP's impact, improving outreach and education, securing funding, and engaging local chapters. Don't miss th…
…
  continue reading
For the 300th (!!!!) episode of the podcast, Seth and Ken reminisce on changes to the industry and overall approach to application security since inception. The hosts discussed the evolution of the industry, noting that once-popular approaches like blindly emulating "hip" Silicon Valley security programs and running unmanaged Security Champions Pro…
…
  continue reading
In this episode of ConversingLabs, host Paul Roberts interviews Abigail Cabunoc Mayes, who is responsible for Open Source Maintainer Programs at GitHub – the world’s leading development platform – about the uncertainty of open source’s future. This uncertainty is caused by a steady decline in Gen Z maintainers, which presents a major software suppl…
…
  continue reading

1
Inside the OWASP GenAI Security Project - Steve Wilson - ASW #352
1:07:32
1:07:32
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:07:32Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
…
  continue reading

1
Inside the OWASP GenAI Security Project - Steve Wilson - ASW #352
1:07:32
1:07:32
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:07:32Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
…
  continue reading

1
Security Awareness Through Trust and Influence - Jennifer Selby Long - CSP #217
35:39
35:39
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
35:39Jennifer Selby Long reframes security awareness as more than training—it's about earning trust and influence with executives and security teams. She shares leadership lessons on how to build stronger alignment and support for security initiatives. Show Notes: https://cisostoriespodcast.com/csp-217
…
  continue reading

1
Security Awareness Through Trust and Influence - Jennifer Selby Long - CSP #217
35:39
35:39
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
35:39Jennifer Selby Long reframes security awareness as more than training—it's about earning trust and influence with executives and security teams. She shares leadership lessons on how to build stronger alignment and support for security initiatives. Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodca…
…
  continue reading

1
Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli
28:05
28:05
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
28:05Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli AISA CyberCon Melbourne | October 15-17, 2025 Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the real…
…
  continue reading

1
Beyond Blame: Navigating the Digital World with Our Kids - Interview with Jacqueline (JJ) Jayne | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli
24:32
24:32
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
24:32Beyond Blame: Navigating the Digital World with Our Kids AISA CyberCon Melbourne | October 15-17, 2025 There's something fundamentally broken in how we approach online safety for young people. We're quick to point fingers—at tech companies, at schools, at kids themselves—but Jacqueline Jayne (JJ) wants to change that conversation entirely. Speaking…
…
  continue reading
 
 
 
