About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Sdlc Podcasts
Brief of SDLC Cover art photo provided by Vanessa Ives on Unsplash: https://unsplash.com/@vanessaives
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
Arrested DevOps is the podcast that helps you achieve understanding, develop good practices, and operate your team and organization for maximum DevOps awesomeness.
…
continue reading
Digestible, research-backed briefs on software, management, and the systems that shape performance—plus the occasional, clearly labeled detour.
…
continue reading
Tune into our tech conversations that allow you to stay up to date on tech trends. Our podcasts revolve around cutting edge tech topics from the most insightful hosts from Knoldus.
…
continue reading
Learn how the top brands wow customers through production-first engineering. On this podcast you will find the tactics, methodologies, and metrics used to drive customer value by the engineering leaders actually doing it. Join Rookout CTO, Liran Haimovitch as he explores how customer-centric brands approach engineering to create a competitive advantage; with interviews covering topics such as automation, issue resolution, team structure, DevOps, and more.
…
continue reading
Modern Software Explore the ever-evolving world of technology and innovation with Modern Software, the podcast that delves into the trends, tools, and techniques shaping the way we build, test, and consume digital solutions. From testing innovations to development breakthroughs, we cover everything impacting those who create software—and those who benefit from it. Join us for casual, conversational interviews with fascinating voices from across the tech space, as we uncover insights, share s ...
…
continue reading
1
VibeCode Episode 2 - Reinventing the SDLC with Vibe Coding
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45In our 2nd episode of VibeCode, we explore how AI is reshaping the Software Development Life Cycle, streamlining every stage of the process, and empowering teams to innovate faster without compromising quality. Follow us on social media - LinkedIn Twitter YouTube Facebook Reach out to us - Website Email Us…
…
continue reading
1
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
…
continue reading
1
VibeCode Episode 5 - From Pilot to Enterprise - Scaling Vibe Coding Across the Organization
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58This episode of VibeCode explores how enterprises move from AI coding experiments to organization-wide adoption, sharing real examples of cross-team rollout, measurable ROI, and stakeholder alignment to turn AI development into a competitive advantage. Follow us on social media - LinkedIn Twitter YouTube Facebook Reach out to us - Website Email Us…
…
continue reading
1
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
1:11:26
1:11:26
Play later
Play later
Lists
Like
Liked
1:11:26Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Microsoft 365 Copilot Newsroom | October 2025
43:45
43:45
Play later
Play later
Lists
Like
Liked
43:45Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
…
continue reading
1
On-Demand Webinar - Microsoft 365 Copilot for Telco, Media, and Gaming
58:20
58:20
Play later
Play later
Lists
Like
Liked
58:20For telco, media, and gaming organizations, AI offers powerful ways to improve operational efficiency, enhance decision-making, and boost workforce productivity. Microsoft 365 Copilot brings those capabilities directly into the tools your teams use every day, but unlocking its full potential takes more than just flipping a switch. In this webinar V…
…
continue reading
1
Microsoft 365 Copilot Newsroom | September 2025
34:21
34:21
Play later
Play later
Lists
Like
Liked
34:21Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
…
continue reading
1
VibeCode Episode 1 - The New Era of Software Development
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47Our kickoff episode of VibeCode explores how natural language and AI tools are redefining software creation, empowering anyone to build applications and marking a pivotal shift for the tech industry. Follow us on social media - LinkedIn Twitter YouTube Facebook Reach out to us - Website Email UsBy Valorem Reply
…
continue reading
1
VibeCode Episode 3 - Why Human Developers Still Matter in an AI-First World
4:43
4:43
Play later
Play later
Lists
Like
Liked
4:43This episode of VibeCode examines how the role of developers is evolving as AI begins writing code, emphasizing their growing importance in validating, refining, and securing AI-generated software. Follow us on social media - LinkedIn Twitter YouTube Facebook Reach out to us - Website Email UsBy Valorem Reply
…
continue reading
1
VibeCode Episode 4 - Building Trust - Governance, Frameworks, and Human-AI Collaboration
4:13
4:13
Play later
Play later
Lists
Like
Liked
4:13This episode of VibeCode explores how organizations can scale AI development responsibly by implementing strong governance, secure architectures, and continuous upskilling to balance machine intelligence with human oversight. Follow us on social media - LinkedIn Twitter YouTube Facebook Reach out to us - Website Email Us…
…
continue reading
1
Quantum Computing Isn't A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
1:03:39
1:03:39
Play later
Play later
Lists
Like
Liked
1:03:39Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
…
continue reading
1
Inside the OWASP GenAI Security Project - Steve Wilson - ASW #352
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
…
continue reading
1
Finding Large Bounties with Large Language Models - Nico Waisman - ASW #351
53:52
53:52
Play later
Play later
Lists
Like
Liked
53:52
…
continue reading
1
How AI Is Changing the SDLC With Hannah Foxwell and Robert Werner
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51The Trust Problem Returns Hannah Foxwell, who has spent over a decade in DevOps and platform engineering, draws a striking parallel to earlier transformations: “It used to be that testers didn’t trust developers and ops didn’t trust testers and there were all these silos. Now we’re putting AI agents in the mix. Can we trust them? Should we trust th…
…
continue reading
1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
Play later
Play later
Lists
Like
Liked
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading
1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
Play later
Play later
Lists
Like
Liked
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
…
continue reading
1
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
…
continue reading
1
Microsoft 365 Copilot Newsroom | August 2025
44:42
44:42
Play later
Play later
Lists
Like
Liked
44:42Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
…
continue reading
1
Webinar - Microsoft 365 Copilot for Oil, Gas, and Energy
55:48
55:48
Play later
Play later
Lists
Like
Liked
55:48For oil, gas, and energy organizations, AI offers powerful ways to improve operational efficiency, enhance decision-making, and boost workforce productivity. Microsoft 365 Copilot brings those capabilities directly into the tools your teams use every day, but unlocking its full potential takes more than just flipping a switch. In this webinar Valor…
…
continue reading
1
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity's door. They discuss the terrifying reality of quantum computing's power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading
1
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Chris Boehm, Idan Plotnik, Josh Lemos, Michael Callahan - ASW #346
1:08:11
1:08:11
Play later
Play later
Lists
Like
Liked
1:08:11In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
…
continue reading
1
Translating Security Regulations into Secure Projects - Roman Zhukov, Emily Fox - ASW #345
1:13:31
1:13:31
Play later
Play later
Lists
Like
Liked
1:13:31The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
…
continue reading
901
Digging Into Security With Kat Cosgrove
29:00
29:00
Play later
Play later
Lists
Like
Liked
29:00Security: the one topic that’s guaranteed to turn any DevOps conversation into a mix of fear, eye rolls, and nervous laughter. In this episode of Arrested DevOps, Matty welcomes back Kat Cosgrove to talk about the “never not hot” world of security and why it’s always lurking just over your shoulder (like that one compliance auditor who swears they’…
…
continue reading
Navigating the AI Supercar: Reshaping the SDLCBy Context Engineered
…
continue reading
1
Microsoft 365 Copilot for Professional Services | Webinar
55:05
55:05
Play later
Play later
Lists
Like
Liked
55:05For professional services firms, AI offers powerful ways to streamline operations, deliver client value, and boost productivity. Microsoft 365 Copilot brings those capabilities directly into the tools your teams use every day, but unlocking its full potential takes more than just flipping a switch. In this webinar, Valorem Reply showcases how to su…
…
continue reading
1
Microsoft 365 Copilot Newsroom | July 2025
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
…
continue reading
1
Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344
1:08:17
1:08:17
Play later
Play later
Lists
Like
Liked
1:08:17A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
…
continue reading
1
Bridging the AI Productivity GAP in Software Development
52:29
52:29
Play later
Play later
Lists
Like
Liked
52:29By Context Engineered
…
continue reading
1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading
Focus on the Product Requirements Prompt (PRP) framework, a structured approach to context engineering for AI-assisted software development. They explain that traditional "vibe coding" and simple prompt engineering are insufficient for complex tasks, proposing that PRPs, which combine adapted Product Requirements Documents with curated codebase int…
…
continue reading
1
Beyond Prompting: Mastering AI Code Assistance with Context Engineering
22:11
22:11
Play later
Play later
Lists
Like
Liked
22:11Context engineering transforms AI coding tools from unpredictable autocomplete systems into reliable development partners through systematic information architecture rather than ad-hoc prompting. The approach involves dynamic curation of project knowledge, structured workflows, and tool-specific optimizations that deliver measurable results—includi…
…
continue reading