Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Application Threat Modeling Podcasts
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
…
continue reading
Chris Romeo is going on a journey. A journey to understand threat modeling at the deepest levels. He thought he understood threat modeling but realized he could go deeper. Chris shares his findings and talks with some of the best-known experts in the space to experience continuous learning. Join along for the ride -- you will learn something. Chris Romeo is the CEO of Devici (THE Threat Modeling Company) and a General Partner at Kerr Ventures.
…
continue reading
Hi! I am Rajesh Prajapati, a Cybersecurity addict from India who spends time in reading every aspect of technology and love to go down the rabbit hole of Security and Privacy.
…
continue reading
The European Union's Cyber Resilience Act is set to revolutionize how we approach product security worldwide. In this episode, we sit down with application security expert Nariman Aga-Tagiyev to break down everything you need to know about this legislation. Nariman has over 20 years of software development experience and today he’s sharing his expe…
…
continue reading
Security challenges at the US-Mexico border are an ongoing threat not only locally but also internationally. In this podcast, Janes analysts Matt Henman and Estefania Dominguez join Sean Corbett and Kate Cox to unravel the intricacies of organised crime's impact on both local economies and international relations, and the advanced use of technology…
…
continue reading

1
Ep. 11 - AI in Offensive Security - Cutting Through the Hype
57:46
57:46
Play later
Play later
Lists
Like
Liked
57:46Episode 12 - AI in Offensive Security: Cutting Through the Hype Host: Tony UV - https://www.linkedin.com/in/tonyuv/ Guest: Andrew Wilson - https://www.linkedin.com/in/awilsonaz/ Is AI revolutionizing offensive security, or simply accelerating what humans already do? In this episode, we cut through the hype and get real about how AI is reshaping vul…
…
continue reading

1
Marisa Fagan - Measuring Security Culture
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05Marisa Fagan, Head of Product at Katilyst and veteran security culture expert joins us today to share practical strategies for building and scaling security champions programs that actually work, from designing effective pilots to avoiding common pitfalls that can derail your initiatives. Learn how to motivate developers using the SAPs model (Statu…
…
continue reading

1
From DevSecOps to AI Security: 6,429 Pros Trained. - Here’s the Data
12:14
12:14
Play later
Play later
Lists
Like
Liked
12:14Security isn't keeping pace with the swift advancements in AI and the explosion of cloud-native adoption. Many teams find themselves trying to mend broken pipelines with outdated AppSec playbooks, leading to significant vulnerabilities. This episode dives deep into how to bridge this critical gap, equipping you with the skills to truly defend moder…
…
continue reading

1
Aram Hovsepyan -- Your Security Dashboard is Lying to You: The Science of Metrics
40:52
40:52
Play later
Play later
Lists
Like
Liked
40:52Aram Hovsepyan joins the podcast today to chat about the misconceptions behind common security metrics. Aram tells us how total vulnerability counts and CVSS scores can be misleading and he introduces us to the Goal Question Metric framework, this framework is a better approach to building truly effective security dashboards. Learn about the critic…
…
continue reading
Uncover the truth behind NATO’s recent defence spending plans and the strategic implications of the organisation’s ambitious 5% GDP target. Janes experts Andrew MacDonald and Guy Anderson join hosts Harry Kemsley and Sean Corbett to discover how open-source intelligence uncovers the reality behind political declarations and spending plans. Can coun…
…
continue reading

1
Sean Varga -- OWASP Top 10 for AppSec Sales
47:13
47:13
Play later
Play later
Lists
Like
Liked
47:13We’re discussing the intersections of application security (AppSec) and sales strategy with our guest, Sean Varga. Sean shares the unique challenges and best practices in AppSec sales, like the importance of empathy, understanding customer needs, and community participation. Learn about the OWASP top 10 for AppSec Sales and discover how to achieve …
…
continue reading
Myanmar is an often overlooked conflict. In this revealing episode of Janes World of Intelligence hosts Sean Corbett and Kate Cox are joined by guest Tony Davis, a senior Asian security analyst and Janes contributor, to provide expert analysis of the geopolitical and humanitarian crises unfolding in Myanmar. They explore the roles of China and othe…
…
continue reading

1
MITRE ATLAS Framework - Securing AI Systems
17:27
17:27
Play later
Play later
Lists
Like
Liked
17:27Welcome to a crucial episode where we delve into the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework, an exhaustive knowledge base designed to secure our increasingly AI-dependent world. As AI and machine learning become foundational across healthcare, finance, and cybersecurity, protecting these systems fro…
…
continue reading

1
Sarah-Jane Madden -- What AI means for AppSec
37:59
37:59
Play later
Play later
Lists
Like
Liked
37:59Sarah Jane Madden joins us to discuss the evolving role of AI in software development. We reflect on the changes and challenges posed by AI, including the potential for over-reliance and the misconception that traditional software engineering practices like the SDLC are obsolete. The conversation explores the nuances of AI-generated code, emphasizi…
…
continue reading

1
AI for automated OSINT reconnaissance - part two
20:11
20:11
Play later
Play later
Lists
Like
Liked
20:11In part two of this podcast, Jim Clover OBE, Varadius Ltd, continues to uncover the evolving landscape of artificial intelligence (AI) in the intelligence community with Harry Kemsley and Sean Corbett. They discuss the fine line between the innovative applications of AI and the critical importance of human oversight in intelligence analysis. Explor…
…
continue reading

1
AI for automated OSINT reconnaissance - part one
29:39
29:39
Play later
Play later
Lists
Like
Liked
29:39While Artificial Intelligence AI is not a new phenomenon, its use in the gathering of intelligence and the amount of AI tools available are growing at pace. In part one of this podcast Harry Kemsley and Sean Corbett are joined by Jim Clover OBE, Varadius Ltd, to take a deeper look into the practical uses and implications of AI for the defence intel…
…
continue reading
Are you ready to face the escalating threat of AI attacks? AI system attacks are hitting companies every single day. Hackers use AI tools to break into major banks and steal millions. It's a critical time for anyone in tech or cybersecurity to understand how to fight back. In this episode, we delve into why AI security is more crucial than ever in …
…
continue reading
Join us for an insightful episode as we delve into the critical realm of product security within the Medtech industry. The digital revolution is transforming patient care, but it also introduces significant security risks to medical devices. We'll explore the complex security environment where devices like pacemakers and diagnostic systems are incr…
…
continue reading

1
Dag Flachet -- Kaizen for your Appsec Program
35:54
35:54
Play later
Play later
Lists
Like
Liked
35:54Dag Flachet joins us to discuss the concept of Kaizen and its application in improving application security. Dag shares his journey into the world of security, emphasizing the importance of iterative, small-step improvements. The conversation delves into how organizations can effectively implement maturity models to enhance their security programs,…
…
continue reading

1
Ep. 11 - Building Resiliency: The New Paradigm in Security Leadership
38:51
38:51
Play later
Play later
Lists
Like
Liked
38:51In this episode, we’re flipping the script on traditional security thinking. As security champions, we know that resiliency isn’t just a buzzword—it’s the backbone of modern cybersecurity strategy. Join us as we unpack: 🔐 From Security to Resiliency – Were we too confident in the early days of CISO-ship? We reflect on the evolution of security lead…
…
continue reading
Welcome to "Securing the Future," the podcast dedicated to navigating the complex world of AI security. In this episode, we unpack the vital role of AI security frameworks—acting as instruction manuals—in safeguarding AI systems for multinational corporations. These frameworks provide uniform guidelines for implementing security measures across div…
…
continue reading
Janes analysts James Trigg and Aparna Iyer join Sean Corbett and Kate Cox to discuss the strategic depths of Yemen’s role in global security. They unpack the complex military, political, and regional dynamics shaping this pivotal Middle Eastern country and how Yemen’s conflict influences international shipping lanes, serves as a battleground for pr…
…
continue reading

1
Global Banks Slash Security Costs 5X with Threat Model Training
11:42
11:42
Play later
Play later
Lists
Like
Liked
11:42Discover how a global financial institution transformed its security posture and achieved massive cost savings through targeted threat modeling training. Facing challenges like inconsistent practices, difficulty scaling training across 50 countries, and keeping pace with evolving threats, this bank needed a new approach beyond infrequent, in-person…
…
continue reading
Five years after their first episode of the World of Intelligence podcast, Kate Cox, director of Janes RD&A Strategic Programmes, turns the table on Harry Kemsley and Sean Corbett to uncover the origins of the podcast and how it has evolved alongside the prominence of OSINT for intelligence analysis, and to offer a glimpse into the future of intell…
…
continue reading

1
Ep.10 - Truth in Marketing An Honest Regard on Marketing Cybersecurity RSA 2025
31:02
31:02
Play later
Play later
Lists
Like
Liked
31:02Welcome to Episode 10 of our Dirty South Security podcast series, where we dive deep into the world of marketing within the cybersecurity industry, especially in the context of RSA 2025. In this episode, we tackle some of the most pressing and controversial topics in the field: Topics Covered: AI Misrepresentations at RSA and Beyond Explore the pra…
…
continue reading

1
Rearming Europe? Funding the rebirth of European defence
45:52
45:52
Play later
Play later
Lists
Like
Liked
45:52Faced with the starkest security environment for in decades, and against the backdrop of competing security priorities by the US as its strongest ally, the European Union (EU) has embarked on a plan to reverse its under-investment in defence and rebuild military capability through the Readiness 2030 initiative. Andrew MacDonald, head of Janes Defen…
…
continue reading

1
What increased military activity over Taiwan tells us about China's threat
30:55
30:55
Play later
Play later
Lists
Like
Liked
30:55Following the release of a special report examining the recent record number of Chinese air-sea operations around Taiwan, Janes Senior Air Reporter Akhil Kadidal joins Harry Kemsley and Sean Corbett to discuss what these escalations could mean for Taiwan. They also examine how the changing military capabilities of China’s People’s Liberation Army (…
…
continue reading

1
The importance of cultural understanding for OSINT
41:23
41:23
Play later
Play later
Lists
Like
Liked
41:23In this podcast culture expert Satgin Hamrah joins Harry Kemsley and Sean Corbett to discuss why understanding culture is crucial in providing context to your intelligence. They explore how ingrained cultural nuances and historical ties influence global security trends, decisions, and behaviours, and why grasping the subtleties of culture is essent…
…
continue reading

1
Javan Rasokat and Andra Lezza -- When Chatbots Go Rogue - Lessons Learned from Building and Defending LLM Applications
47:31
47:31
Play later
Play later
Lists
Like
Liked
47:31Andra Lezza and Javan Rasokat discuss the complexities of securing AI and LLM applications. With years of experience in Application Security (AppSec), Andra and Javan share their journey and lessons from their DEF CON talk on building and defending LLMs. They explore critical vulnerabilities, prompt injection, hallucinations, and the importance of …
…
continue reading

1
Jim Routh -- The CISO Transition to the rest of life
49:36
49:36
Play later
Play later
Lists
Like
Liked
49:36Former CISO Jim Routh discusses his perspective on retirement and career fulfillment in cybersecurity. Rather than viewing retirement as simply stopping work, Routh describes his three-filter approach: working only with people he respects and admires, doing only work he finds fulfilling, and controlling when he works. He shares valuable lessons lea…
…
continue reading

1
Unravelling the North Korea Enigma - part two
28:17
28:17
Play later
Play later
Lists
Like
Liked
28:17In part two of our podcast, Jenny Town, Rachel Minyoung Lee, and Martin Williams from 38 North and Cristina Varriale from Janes join Harry Kemsley and Sean Corbett to continue to unravel the implications of the new US administration on North Korea’s place on the world stage and how its relationship with Russia might evolve in 2025 and beyond.…
…
continue reading

1
Ep.09 - Business Takes on InfoSec - Program Alignment, Metrics, Leveraging Managed Services
48:42
48:42
Play later
Play later
Lists
Like
Liked
48:42In this episode, Tony UV and Q0PHI are joined by Rafal Lo, a seasoned InfoSec professional, to discuss the intersection of business and information security. Tune in as they explore: 1. Aligning InfoSec programs with business objectives 2. Key metrics for measuring InfoSec success 3. The benefits and challenges of leveraging managed services Don't …
…
continue reading

1
Henrik Plate -- OWASP Top 10 Open Source Risks
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26Henrik Plate joins us to discuss the OWASP Top 10 Open Source Risks, a guide highlighting critical security and operational challenges in using open source dependencies. The list includes risks like known vulnerabilities, compromised legitimate packages, name confusion attacks, and unmaintained software, providing developers and organizations a fra…
…
continue reading

1
Tanya Janca -- A Secure SDLC from a Developer's Perspective
48:54
48:54
Play later
Play later
Lists
Like
Liked
48:54Security expert Tanya Janca discusses her new book "Alice and Bob Learn Secure Coding" and shares insights on making security accessible to developers. In this engaging conversation, she explores how security professionals can better connect with developers through threat modeling, maintaining empathy, and creating inclusive learning environments. …
…
continue reading