Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Modern Software Explore the ever-evolving world of technology and innovation with Modern Software, the podcast that delves into the trends, tools, and techniques shaping the way we build, test, and consume digital solutions. From testing innovations to development breakthroughs, we cover everything impacting those who create software—and those who benefit from it. Join us for casual, conversational interviews with fascinating voices from across the tech space, as we uncover insights, share s ...
  continue reading
 
Welcome to Shaping Healthcare, a podcast by CitiusTech. Some of the great minds in the world are constantly striving to solve the healthcare industry's greatest challenges with technology, creativity, and agility. With every episode of The Shaping Healthcare Podcast, we will take you deeper into the world of healthcare and life sciences and give you a perspective into what it takes to build a human-first, technologically enabled healthcare world.
  continue reading
 
Artwork

51
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Loading …
show series
 
In this episode, I explore the crucial principle of 'Shift Left' in security, emphasizing the integration of security measures early in the software development lifecycle (SDLC). I will explain the necessity of moving security considerations from late stages, such as post-release testing, to the very beginning—starting from ideation, requirements, …
  continue reading
 
Send us a text In this episode of Modern Software, host Mike Verinder sits down with Marcel Veselka, founder of Wopee.io, for an honest and insightful look into the evolving world of autonomous software testing. They dive into Marcel’s journey from PowerPoint prototype to a fully functional AI-driven testing platform that’s reshaping how teams thin…
  continue reading
 
Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether human or AI. But more code means more reasons for appsec to scale its practices and figure out how to establish trust in code, packages, and designs. Rey …
  continue reading
 
In this episode of Shaping Healthcare, host Laurel Rockall welcomes Anita Mangtani, Senior Healthcare Consultant for Life Sciences at Citius Healthcare Consulting, for an in-depth discussion on interoperability in life sciences. Join them as they: Explore what effective interoperability looks like in life sciences Examine how compliance requirement…
  continue reading
 
We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
  continue reading
 
In this episode, Gordon Mullan and Govind Shukla dive into the latest AI news, like the new updates to OpenAI's GPT-4.1, Anthropic’s $50M focus on making models easier to understand, and the UAE’s push to bring AI into lawmaking. Tune in for a look at how AI is shaking up technology, regulation, and society! NAVIGATION 00:00 - Introduction 01:01 - …
  continue reading
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
In 2025, AI agents are changing how developers code, build, and think about software. In this video, an experienced solution architect Vladislav Vorobev explains the real differences between popular AI assistants like Copilot and Windsurf, how AI agents actually work in programming, what skills developers need to stay competitive, and where the lin…
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
  continue reading
 
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
  continue reading
 
We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
  continue reading
 
Send us a text 🎙️ Episode Title: Is BDD Dying? Did Low-Code Kill It? In this episode of Modern Software, host Mike Verinder is joined by Andy Knight (aka The Automation Panda) for a thoughtful, spicy, and at times hilarious conversation about the state of Behavior-Driven Development (BDD) in 2025. BDD was supposed to revolutionize how teams collabo…
  continue reading
 
In this first episode of our new podcast, Gordon Mullan and Govind Shukla discuss the latest news in the world of AI, plus other news from robotics, ethics, regulation, and more! NAVIGATION 00:00 - Introduction 06:42 - Google 18:15 - OpenAI 21:44 - Microsoft 40:08 - Mistral 45:16 - China: Alibaba 52:40 - China: Manus 56:30 - Windsurf Editor 57:40 -…
  continue reading
 
LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
  continue reading
 
👉 Integrate GitHub Copilot and ChatGPT into your daily work: https://aw.club/global/en/courses/ai-supported-software-engineering In this episode of "Mock Interview Show #5", we dive into .NET and Angular coding interview questions and answers. Whether you're a beginner or have 4+ years of experience, this session will provide valuable insights into…
  continue reading
 
Andra Lezza and Javan Rasokat discuss the complexities of securing AI and LLM applications. With years of experience in Application Security (AppSec), Andra and Javan share their journey and lessons from their DEF CON talk on building and defending LLMs. They explore critical vulnerabilities, prompt injection, hallucinations, and the importance of …
  continue reading
 
The crypto world is rife with smart contracts that have been outsmarted by attackers, with consequences in the millions of dollars (and more!). Shashank shares his research into scanning contracts for flaws, how the classes of contract flaws have changed in the last few years, and how optimistic we can be about the future of this space. Segment Res…
  continue reading
 
Former CISO Jim Routh discusses his perspective on retirement and career fulfillment in cybersecurity. Rather than viewing retirement as simply stopping work, Routh describes his three-filter approach: working only with people he respects and admires, doing only work he finds fulfilling, and controlling when he works. He shares valuable lessons lea…
  continue reading
 
Just three months into 2025 and we already have several hundred CVEs for XSS and SQL injection. Appsec has known about these vulns since the late 90s. Common defenses have been known since the early 2000s. Jack Cable talks about CISA's Secure by Design principles and how they're trying to refocus businesses on addressing vuln classes and prioritizi…
  continue reading
 
Henrik Plate joins us to discuss the OWASP Top 10 Open Source Risks, a guide highlighting critical security and operational challenges in using open source dependencies. The list includes risks like known vulnerabilities, compromised legitimate packages, name confusion attacks, and unmaintained software, providing developers and organizations a fra…
  continue reading
 
Curl and libcurl are everywhere. Not only has the project maintained success for almost three decades now, but it's done that while being written in C. Daniel Stenberg talks about the challenges in dealing with appsec, the design philosophies that keep it secure, and fostering a community to create one of the most recognizable open source projects …
  continue reading
 
In this episode of Shaping Healthcare, host Laurel Rockall welcomes Shitang Patel, VP of Health Plans and Consulting at CitiusTech, Jennifer Zellinger, VP of Product Development and Management at enGen, and Jennifer Magaro, SVP of Customer & Engagement Experience Solutions at enGen, for an in-depth discussion on integrated healthcare solutions and …
  continue reading
 
Security expert Tanya Janca discusses her new book "Alice and Bob Learn Secure Coding" and shares insights on making security accessible to developers. In this engaging conversation, she explores how security professionals can better connect with developers through threat modeling, maintaining empathy, and creating inclusive learning environments. …
  continue reading
 
Send us a text Revolutionizing Testing with AI: Checksum’s Journey In this episode of Modern Software, Mike Verinder sits down with Gal Vered, co-founder of Checksum, to explore how AI is reshaping the Autonomous Software Development Life Cycle (SDLC). Gal shares his journey, the mission behind Checksum, and how their AI-driven testing solutions ar…
  continue reading
 
Minimizing latency, increasing performance, and reducing compile times are just a part of what makes a development environment better. Throw in useful tests and some useful security tools and you have an even better environment. Dan Moore talks about what motivates some developers to prefer a "local first" approach as we walk through what all of th…
  continue reading
 
We're getting close to two full decades of celebrating web hacking techniques. James Kettle shares which was his favorite, why the list is important to the web hacking community, and what inspires the kind of research that makes it onto the list. We discuss why we keep seeing eternal flaws like XSS and SQL injection making these lists year after ye…
  continue reading
 
In this episode of Shaping Healthcare, host Laurel Rockall welcomes Vinay Kumar Ramachander, Assistant Vice President at CitiusTech, and Francis Mohanty, Enterprise Sales Engineer for Global SIs at Harness, for an in-depth discussion on healthcare technology transformation. Join them as they: Explore how DevOps trends are reshaping healthcare techn…
  continue reading
 
Mehran Koushkebaghi, a seasoned engineering expert, delves into the intricacies of systemic security. He draws parallels between civil engineering and IT systems, and explains the importance of holistic thinking in security design. Discover the difference between semantic and syntactic vulnerabilities and understand how anti-requirements play a cri…
  continue reading
 
Loading …
Listen to this show while you explore
Play