Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

DevSecOps Podcasts

show episodes
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
  continue reading
 
Artwork

1
The DevSecOps Talks Podcast

Mattias Hemmingsson, Julien Bisconti and Andrey Devyatkin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
  continue reading
 
Sushi Bytes is an unapologetically AI-generated podcast brought to you by Shinobi, FossID’s vigilant Software Composition Analysis ninja. In each bite-sized episode, Shinobi breaks down the evolving world of software supply chain integrity – from open-source license compliance and vulnerability disclosure to SBOM standards, IP risks, and AI-generated code implications. With a surge in regulatory scrutiny and AI adoption, the software stack is becoming harder to manage – and riskier to ignore ...
  continue reading
 
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
  continue reading
 
Artwork
 
Where LLMs, AI Agents, and MCP tools meet DevOps. How can we humans use non-deterministic, often hallucinating LLMs to automate our infrastructure and help us with the job of software lifecycle management? I’m Bret Fisher, and this is the Agentic DevOps podcast. After the invention of AI Agents and the MCP standard in late 2024, I started this podcast in early '25 with a narrow topic focus… to document and advise how AI Agents, MCP tools, and large language models can be used in the real wor ...
  continue reading
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Artwork

1
DevSecOps Cracking The Code

devsecopscrackingthecode

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
  continue reading
 
Artwork

1
Profound

John Willis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Ramblings about W. Edwards Deming in the digital transformation era. The general idea of the podcast is derived from Dr. Demming's seminal work described in his New Economics book - System of Profound Knowledge ( SoPK ). We'll try and get a mix of interviews from IT, Healthcare, and Manufacturing with the goal of aligning these ideas with Digital Transformation possibilities. Everything related to Dr. Deming's ideas is on the table (e.g., Goldratt, C.I. Lewis, Ohno, Shingo, Lean, Agile, and ...
  continue reading
 
Artwork

1
Application Paranoia

Colin Bell, Rob Cuddy & Kris Duer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
  continue reading
 
A podcast about everything that happens after \`git push\` Justin Garrison & Autumn Nash explore all things DevOps, infra, cloud & running apps in production. Whether you're cloud native, Kubernetes curious, a pro SRE, or just operating a VPS... you'll love coming along for the ride. Some people search for ShipIt or ShipItFM and can't find the show, so now the strings ShipIt and ShipItFM are in our description too.
  continue reading
 
Artwork

1
theCronJob

Zesty Tech Ltd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A podcast for engineers building and operating modern infrastructure. Powered by Zesty. Hosted by Omer Hamerman and Mark Serdze, The Cron Job explores Kubernetes quirks, cost optimization strategies, scaling, reliability, and the art of keeping things from catching fire in production, all while unpacking the deeper DevOps questions around ownership, automation, and the tradeoffs behind every engineering decision. Tune in for real-world stories, sharp insights, and the occasional infrastructu ...
  continue reading
 
Step into the DevOps Sauna with Pinja Kujala and Stefan Daugaard Poulsen as they explore Agile and DevOps methodologies. Hear from various industry experts and discover how Agile and DevOps principles can transform any part of your business. The DevOps Sauna ensures you have the latest practices and trends to maintain a competitive edge.
  continue reading
 
Artwork

1
CTRL+ALT+DEPLOY

controlaltdeploy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CTRL+ALT+DEPLOY is the DevOps podcast for modern engineering leaders navigating what’s now and what’s next. From agentic AI and autonomous DevOps to platform consolidation, cloud performance, and secure software supply chains, we cut through the buzzwords to explore the real-world impact of emerging tools and practices. Each episode features candid conversations with DevOps experts across industries, offering insights and practical takeaways on how to build faster, stay secure, and scale sma ...
  continue reading
 
Artwork

1
Coffee, Chaos and ProdSec

Coffee, Chaos and ProdSec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Coffee, Chaos & ProdSec is where cybersecurity meets caffeine-fueled chaos. Hosts Kurt (security architect and chaos tamer) and Cameron (ProdSec wrangler and DevSecOps junkie) dive into hacking, AppSec, supply chain failures, AI surprises, and the everyday madness of defending modern systems. With humor, sharp insight, real breach breakdowns, bad password confessions, and a few questionable impressions, they explore the messy reality of security and how teams survive it. New episodes Every W ...
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
  continue reading
 
Artwork
 
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we're proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we're pleased to share the talent and perspective of our staff as it relates to today's emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
  continue reading
 
Lessons from Production brings you real-world stories from tech leaders who’ve been in the trenches. Each episode dives into the challenges, hard-earned lessons, and behind-the-scenes insights from building and scaling technology in production. No fluff, just practical takeaways from experts who’ve lived it.
  continue reading
 
Artwork

1
SEI Shorts

Members of Technical Staff at the Software Engineering Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
  continue reading
 
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
  continue reading
 
Artwork
 
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
  continue reading
 
Welcome to The DevOps Toolchain Show – your go-to podcast for mastering the evolving world of DevOps! Previously known as The TestGuild Performance and SRE Podcast, we dive deep into the latest trends, must-know tools, and cutting-edge techniques shaping modern software delivery. Join industry experts, engineers, and thought leaders as we uncover insights on automation, performance testing, security, CI/CD, AI in DevOps, and everything in between. Whether you're a DevOps practitioner, SRE, o ...
  continue reading
 
Artwork

1
DevOps State of Mind

LogDNA x StudioPod Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Curious about DevOps? In this podcast series we dive deep into the DevOps culture and chat with friends from small startups and large enterprises about what DevOps looks like in their organizations. Join us weekly to hear about the problems they are solving, how their teams work together, and the tools they are using to get the job done. Subscribe to the show to get into a DevOps State of Mind. This podcast is brought to you by LogDNA, the log management tool for teams that embrace DevOps.
  continue reading
 
Artwork

1
Lessons in Cybersecurity

Prof. Avishai Wool * Sponsored by AlgoSec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Lessons in Cybersecurity. In this podcast, you’ll find effective strategies and tangible tactics you can apply in your organization to tighten network security. Avishai Wool is a professor at Tel Aviv University and co-founder and CTO of AlgoSec, the worldā€˜s leading application connectivity and security policy company. He has served on the program committees of the leading IEEE and ACM conferences on computer and network security, has published more than 110 research papers and ho ...
  continue reading
 
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
  continue reading
 
Artwork

1
DevOps Chat

DevOps.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
  continue reading
 
Artwork

1
SilverLining IL

MarkeTech Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The podcast for Security Architecture Hosted by Moshe Ferber and Ariel Munafo. The world of software development has changed rapidly in the last years due to various factors – Cloud Computing, Digital Transformation, CI/CD & DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The sec ...
  continue reading
 
Loading …
show series
 
The cybersecurity market is currently experiencing a massive talent shortfall in the emerging field of Artificial Intelligence security, driving compensation for specialized roles to unprecedented heights. AI security roles are projected to pay between 180K–280K in 2026, but the majority of cybersecurity professionals lack the necessary qualificati…
  continue reading
 
Want a quick map of EU compliance for engineers? How do you classify AI by risk and tell users when AI is used? When do you send a 24-hour heads-up and a one-month report after an incident? Does NIS2 make your board liable and your logs mandatory? We are always happy to answer any questions, hear suggestions for new episodes, or hear from you, our …
  continue reading
 
šŸŽ™ļø Coffee, Chaos and ProdSec - Ep 14 DevSecOps gets thrown around in cybersecurity more than any other term, but almost no one agrees on what it actually means. So this week, Kurt and Cameron pour fresh mugs and unpack the real practices behind modern Application Security, Product Security, DevSecOps, and Software Supply Chain Security without the …
  continue reading
 
In this episode, Omer and Mark discuss the importance of integrating security into the DevOps culture, specifically focusing on DevSecOps. They explore the responsibilities of developers in ensuring application security, the significance of understanding the OWASP Top 10 vulnerabilities, and the need for actionable security practices. The conversat…
  continue reading
 
AI is transforming software development—redefining roles, creativity, and community, while challenging developers to embrace ambiguity, orchestrate specialized agents, and stay human through empathy and curiosity. Will AI make developers more creative, or will we forget how the machine really works under the hood? This week Dave, Esmee , Rob sit do…
  continue reading
 
šŸŽ™ļø Coffee, Chaos and ProdSec - Ep 15 Vulnerabilities are piling up faster than teams can read the reports, and vulnerability management is buckling under the weight. So this week, Kurt and Cameron grab their mugs and dig into why modern VM feels impossible, why severity scores mislead everyone, and how reachability and exploitability matter far mor…
  continue reading
 
The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
  continue reading
 
AI is transforming DevOps and testing, shifting roles towards quality engineering while emphasizing human involvement. Insights from Yaniv Sayers’s experience at OpenText reveal how AI enhances the software delivery lifecycle. Trust in AI remains a challenge, yet many professionals embrace these tools. The future envisions autonomous delivery teams…
  continue reading
 
In this episode, Omer and Mark discuss the recent outages affecting major internet services like Cloudflare and AWS, exploring the implications of AI on infrastructure reliability, the centralization of internet services, and the risks associated with automation in DevOps. They also delve into the challenges of DNS management and the future of AI i…
  continue reading
 
Send us a text Open source powers nearly everything we build today—but what is it actually worth? Pinja and Stefan discuss Harvard’s $8 trillion estimate, how widely open source is used, and why central registries are under pressure. They touch on security risks, supply chain attacks, and what the EU Cyber Resilience Act means for companies using O…
  continue reading
 
Live from the iconic Venetian in Las Vegas, we’re rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesn’t alway…
  continue reading
 
Live from the iconic Venetian in Las Vegas, we’re rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesn’t alway…
  continue reading
 
Live from the iconic Venetian in Las Vegas, we’re rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesn’t alway…
  continue reading
 
Live from the iconic Venetian in Las Vegas, we’re rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesn’t alway…
  continue reading
 
Cybercrime drains trillions of dollars globally each year. Today's threat landscape is defined by smart, adaptable adversaries: 40% of all cyberattacks use AI to find hidden weaknesses, and nearly all companies (93%) now face these advanced threats daily. The Certified AI Security Professional (CAISP) course compresses the typical 2–4 years needed …
  continue reading
 
Live from the iconic Venetian in Las Vegas, we’re rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesn’t alway…
  continue reading
 
Live from the iconic Venetian in Las Vegas, we’re rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesn’t alway…
  continue reading
 
Episode Summary As AI systems become increasingly integrated into enterprise workflows, a new security frontier is emerging. In this episode of The Secure Developer, host Danny Allan speaks with Nicolas Dupont about the often-overlooked vulnerabilities hiding in vector databases and how they can be exploited to expose sensitive data. Show Notes As …
  continue reading
 
The EU Cyber Resilience Act (CRA) is reshaping global expectations for software security – and putting Software Bill of Materials (SBOMs) at the center of compliance. In this episode, Shinobi and Gen break down what the CRA requires, how it compares to U.S. regulations, and what engineering and legal teams must do now to stay ahead. Whether you're …
  continue reading
 
For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
  continue reading
 
In this episode, our host Omer and special guest Tzachi Tzafrir discuss the complexities of testing in Kubernetes, exploring various strategies for effective quality assurance. Tzachi shares insights on balancing fast testing environments with realistic production-like scenarios, the significance of chaos engineering, and the processes involved in …
  continue reading
 
Accelerating cloud adoption to drive innovation across domains like space, identity, and naval systems presents unique challenges. Success depends on aligning organizational culture, governance, financial models, and regulatory frameworks to enable collaboration, scalability, and software-defined capabilities. This week, Dave, Esmee, and Rob speak …
  continue reading
 
šŸŽ™ļø Coffee, Chaos & ProdSec – Episode 13 This week, Cameron and Kurt tackle the questions everyone claims to understand but absolutely argues about in every cloud meeting. What is the cloud really? Why is identity suddenly the perimeter? And how did Kubernetes quietly become everyone’s new production environment? We break down the real concerns behi…
  continue reading
 
What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec fol…
  continue reading
 
Episode: Securing AI Systems - A Deep Dive into AI Security with Marudhamaran Gunashekaran In this episode, Jeremy Daly, Cybersecurity Lead at Lumifi, sits down with Marudhamaran Gunashekaran, Principal Security Consultant and Lead Author of the Certified AI Security Professional (CAISP) course at Practical DevSecOps (a Hysn Technologies company). …
  continue reading
 
In this episode of The Crown Job, Omer and Mark delve into the spooky side of technology, sharing horror stories from their experiences in the tech industry. They discuss the recent AWS outage and its bizarre effects on smart mattresses, a ghostly incident in a production environment, a certificate authority crisis, and the challenges of managing c…
  continue reading
 
Is MCP just another server you need to threat model, patch, and monitor? How do you keep users from over-privileged access, block LLM injection, and stop blind spots? We unpack the VentureBeat article https://venturebeat.com/security/mcp-stacks-have-a-92-exploit-probability-how-10-plugins-became-enterprise with real-world tips. We are always happy …
  continue reading
 
Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
  continue reading
 
Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
  continue reading
 
Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
  continue reading
 
Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
  continue reading
 
Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
  continue reading
 
šŸŽ™ļø Coffee, Chaos & ProdSec - Ep 12 The OWASP Top 10:2025 RC1 is here, and it is already causing chaos. So this week, Kurt and Cameron grab their mugs and break down every category with real world stories, honest takes, and a few spicy opinions on why some vulnerabilities just will not go away. From Broken Access Control dominating the charts again,…
  continue reading
 
Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
  continue reading
 
šŸŽ™ļø Coffee, Chaos & ProdSec – Episode 11 This week, Kurt and Cameron break down the showdown between Google’s Big Sleep AI and the FFmpeg maintainers keeping the internet’s media backbone running for free. A tiny bug in a 1995 video codec sparked a big debate about responsibility, AI-driven vulnerability hunting, and the growing strain on open sourc…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
šŸŽ™ļø Coffee, Chaos & ProdSec – Ep 10 This week, Cameron and Kurt sit down with the co-founders of the OWASP Secure Pipeline Verification Standard to unpack the real story behind SPVS and why the industry desperately needed a pipeline-focused security standard. From the early days of chaotic DevSecOps practices and scattered controls, to the moment th…
  continue reading
 
Developer experience and productivity are critical, but so is copyright and license compliance. In this episode of Sushi Bytes, Shinobi and Gen talk about the tug-of-war between productivity-centric engineering teams and risk-averse legal teams. Who will win? Tune in to hear how modern SCA tooling can align speed with safety, automate away this fri…
  continue reading
 
Not every Software Composition Analysis (SCA) tool reveals what’s really haunting your code. In this Halloween-themed episode of Sushi Bytes, Shinobi and Gen explore why comparing SCA tools is trickier than it seems—and what engineering and compliance teams should look for under the mask. From snippet detection and modified code to license clarity,…
  continue reading
 
In this episode of Sushi Bytes, Shinobi and Gen unpack the high-stakes reality of code snippet: when small fragments of open source code make their way into proprietary applications and go undetected by traditional SCA tools. From copy-pasted Stack Overflow answers to AI-generated code functions, these sometimes-small code segments can carry seriou…
  continue reading
 
This webcast offers a solution to the problem of poorly defined requirements in system design that can lead to software flaws, cost and time overruns, and stakeholder dissatisfaction. We will tell you how to use a structured process called the ATAM (architectural tradeoffs analysis method) to develop a system design by eliciting requirements, scena…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play