Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Application Threat Modeling Podcasts

show episodes
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
  continue reading
 
Chris Romeo is going on a journey. A journey to understand threat modeling at the deepest levels. He thought he understood threat modeling but realized he could go deeper. Chris shares his findings and talks with some of the best-known experts in the space to experience continuous learning. Join along for the ride -- you will learn something. Chris Romeo is the CEO of Devici (THE Threat Modeling Company) and a General Partner at Kerr Ventures.
  continue reading
 
Artwork

1
Rajesh's Podcast

Rajesh Prajapati

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hi! I am Rajesh Prajapati, a Cybersecurity addict from India who spends time in reading every aspect of technology and love to go down the rabbit hole of Security and Privacy.
  continue reading
 
Loading …
show series
 
The European Union's Cyber Resilience Act is set to revolutionize how we approach product security worldwide. In this episode, we sit down with application security expert Nariman Aga-Tagiyev to break down everything you need to know about this legislation. Nariman has over 20 years of software development experience and today he’s sharing his expe…
  continue reading
 
Security challenges at the US-Mexico border are an ongoing threat not only locally but also internationally. In this podcast, Janes analysts Matt Henman and Estefania Dominguez join Sean Corbett and Kate Cox to unravel the intricacies of organised crime's impact on both local economies and international relations, and the advanced use of technology…
  continue reading
 
Episode 12 - AI in Offensive Security: Cutting Through the Hype Host: Tony UV - https://www.linkedin.com/in/tonyuv/ Guest: Andrew Wilson - https://www.linkedin.com/in/awilsonaz/ Is AI revolutionizing offensive security, or simply accelerating what humans already do? In this episode, we cut through the hype and get real about how AI is reshaping vul…
  continue reading
 
Marisa Fagan, Head of Product at Katilyst and veteran security culture expert joins us today to share practical strategies for building and scaling security champions programs that actually work, from designing effective pilots to avoiding common pitfalls that can derail your initiatives. Learn how to motivate developers using the SAPs model (Statu…
  continue reading
 
Security isn't keeping pace with the swift advancements in AI and the explosion of cloud-native adoption. Many teams find themselves trying to mend broken pipelines with outdated AppSec playbooks, leading to significant vulnerabilities. This episode dives deep into how to bridge this critical gap, equipping you with the skills to truly defend moder…
  continue reading
 
Aram Hovsepyan joins the podcast today to chat about the misconceptions behind common security metrics. Aram tells us how total vulnerability counts and CVSS scores can be misleading and he introduces us to the Goal Question Metric framework, this framework is a better approach to building truly effective security dashboards. Learn about the critic…
  continue reading
 
Uncover the truth behind NATO’s recent defence spending plans and the strategic implications of the organisation’s ambitious 5% GDP target. Janes experts Andrew MacDonald and Guy Anderson join hosts Harry Kemsley and Sean Corbett to discover how open-source intelligence uncovers the reality behind political declarations and spending plans. Can coun…
  continue reading
 
We’re discussing the intersections of application security (AppSec) and sales strategy with our guest, Sean Varga. Sean shares the unique challenges and best practices in AppSec sales, like the importance of empathy, understanding customer needs, and community participation. Learn about the OWASP top 10 for AppSec Sales and discover how to achieve …
  continue reading
 
Myanmar is an often overlooked conflict. In this revealing episode of Janes World of Intelligence hosts Sean Corbett and Kate Cox are joined by guest Tony Davis, a senior Asian security analyst and Janes contributor, to provide expert analysis of the geopolitical and humanitarian crises unfolding in Myanmar. They explore the roles of China and othe…
  continue reading
 
Welcome to a crucial episode where we delve into the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework, an exhaustive knowledge base designed to secure our increasingly AI-dependent world. As AI and machine learning become foundational across healthcare, finance, and cybersecurity, protecting these systems fro…
  continue reading
 
Sarah Jane Madden joins us to discuss the evolving role of AI in software development. We reflect on the changes and challenges posed by AI, including the potential for over-reliance and the misconception that traditional software engineering practices like the SDLC are obsolete. The conversation explores the nuances of AI-generated code, emphasizi…
  continue reading
 
In part two of this podcast, Jim Clover OBE, Varadius Ltd, continues to uncover the evolving landscape of artificial intelligence (AI) in the intelligence community with Harry Kemsley and Sean Corbett. They discuss the fine line between the innovative applications of AI and the critical importance of human oversight in intelligence analysis. Explor…
  continue reading
 
While Artificial Intelligence AI is not a new phenomenon, its use in the gathering of intelligence and the amount of AI tools available are growing at pace. In part one of this podcast Harry Kemsley and Sean Corbett are joined by Jim Clover OBE, Varadius Ltd, to take a deeper look into the practical uses and implications of AI for the defence intel…
  continue reading
 
Are you ready to face the escalating threat of AI attacks? AI system attacks are hitting companies every single day. Hackers use AI tools to break into major banks and steal millions. It's a critical time for anyone in tech or cybersecurity to understand how to fight back. In this episode, we delve into why AI security is more crucial than ever in …
  continue reading
 
Join us for an insightful episode as we delve into the critical realm of product security within the Medtech industry. The digital revolution is transforming patient care, but it also introduces significant security risks to medical devices. We'll explore the complex security environment where devices like pacemakers and diagnostic systems are incr…
  continue reading
 
Dag Flachet joins us to discuss the concept of Kaizen and its application in improving application security. Dag shares his journey into the world of security, emphasizing the importance of iterative, small-step improvements. The conversation delves into how organizations can effectively implement maturity models to enhance their security programs,…
  continue reading
 
In this episode, we’re flipping the script on traditional security thinking. As security champions, we know that resiliency isn’t just a buzzword—it’s the backbone of modern cybersecurity strategy. Join us as we unpack: 🔐 From Security to Resiliency – Were we too confident in the early days of CISO-ship? We reflect on the evolution of security lead…
  continue reading
 
Welcome to "Securing the Future," the podcast dedicated to navigating the complex world of AI security. In this episode, we unpack the vital role of AI security frameworks—acting as instruction manuals—in safeguarding AI systems for multinational corporations. These frameworks provide uniform guidelines for implementing security measures across div…
  continue reading
 
Janes analysts James Trigg and Aparna Iyer join Sean Corbett and Kate Cox to discuss the strategic depths of Yemen’s role in global security. They unpack the complex military, political, and regional dynamics shaping this pivotal Middle Eastern country and how Yemen’s conflict influences international shipping lanes, serves as a battleground for pr…
  continue reading
 
Discover how a global financial institution transformed its security posture and achieved massive cost savings through targeted threat modeling training. Facing challenges like inconsistent practices, difficulty scaling training across 50 countries, and keeping pace with evolving threats, this bank needed a new approach beyond infrequent, in-person…
  continue reading
 
Five years after their first episode of the World of Intelligence podcast, Kate Cox, director of Janes RD&A Strategic Programmes, turns the table on Harry Kemsley and Sean Corbett to uncover the origins of the podcast and how it has evolved alongside the prominence of OSINT for intelligence analysis, and to offer a glimpse into the future of intell…
  continue reading
 
Welcome to Episode 10 of our Dirty South Security podcast series, where we dive deep into the world of marketing within the cybersecurity industry, especially in the context of RSA 2025. In this episode, we tackle some of the most pressing and controversial topics in the field: Topics Covered: AI Misrepresentations at RSA and Beyond Explore the pra…
  continue reading
 
Faced with the starkest security environment for in decades, and against the backdrop of competing security priorities by the US as its strongest ally, the European Union (EU) has embarked on a plan to reverse its under-investment in defence and rebuild military capability through the Readiness 2030 initiative. Andrew MacDonald, head of Janes Defen…
  continue reading
 
Following the release of a special report examining the recent record number of Chinese air-sea operations around Taiwan, Janes Senior Air Reporter Akhil Kadidal joins Harry Kemsley and Sean Corbett to discuss what these escalations could mean for Taiwan. They also examine how the changing military capabilities of China’s People’s Liberation Army (…
  continue reading
 
In this podcast culture expert Satgin Hamrah joins Harry Kemsley and Sean Corbett to discuss why understanding culture is crucial in providing context to your intelligence. They explore how ingrained cultural nuances and historical ties influence global security trends, decisions, and behaviours, and why grasping the subtleties of culture is essent…
  continue reading
 
Andra Lezza and Javan Rasokat discuss the complexities of securing AI and LLM applications. With years of experience in Application Security (AppSec), Andra and Javan share their journey and lessons from their DEF CON talk on building and defending LLMs. They explore critical vulnerabilities, prompt injection, hallucinations, and the importance of …
  continue reading
 
Former CISO Jim Routh discusses his perspective on retirement and career fulfillment in cybersecurity. Rather than viewing retirement as simply stopping work, Routh describes his three-filter approach: working only with people he respects and admires, doing only work he finds fulfilling, and controlling when he works. He shares valuable lessons lea…
  continue reading
 
In part two of our podcast, Jenny Town, Rachel Minyoung Lee, and Martin Williams from 38 North and Cristina Varriale from Janes join Harry Kemsley and Sean Corbett to continue to unravel the implications of the new US administration on North Korea’s place on the world stage and how its relationship with Russia might evolve in 2025 and beyond.…
  continue reading
 
In this episode, Tony UV and Q0PHI are joined by Rafal Lo, a seasoned InfoSec professional, to discuss the intersection of business and information security. Tune in as they explore: 1. Aligning InfoSec programs with business objectives 2. Key metrics for measuring InfoSec success 3. The benefits and challenges of leveraging managed services Don't …
  continue reading
 
Henrik Plate joins us to discuss the OWASP Top 10 Open Source Risks, a guide highlighting critical security and operational challenges in using open source dependencies. The list includes risks like known vulnerabilities, compromised legitimate packages, name confusion attacks, and unmaintained software, providing developers and organizations a fra…
  continue reading
 
Security expert Tanya Janca discusses her new book "Alice and Bob Learn Secure Coding" and shares insights on making security accessible to developers. In this engaging conversation, she explores how security professionals can better connect with developers through threat modeling, maintaining empathy, and creating inclusive learning environments. …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play