Application Security Weekly (Audio)
4.9(12)

Application Security Weekly (Audio)

by Mike Shema

395 episodesLatest todayEN
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.

© 2024 CyberRisk Alliance

Recent reviews on Apple Podcasts (3)
  • Yes

    It’s the best.

    Alpha Gay ·

  • Great show

    Amazing show with great news and tips on making sure you code is secure.

    DMLou ·

  • Great show

    Best show I’ve found so far related to AppSec

    jrod d ·

View all reviews on Apple Podcasts

Episodes (395)

  1. Keeping Up With the OWASP GenAI Project - Scott Clinton - ASW #381

    May 5, 20261h 9m

    Speed is the most common theme among developers and appsec teams working with LLMs and agents, from trying to keep up with patterns for deploying agents to dealing with more code faster to how the latest models impact co

  2. Top 10 Web Hacking Techniques of 2025 and a Hint for 2026 - James Kettle - ASW #380

    Apr 28, 202644m

    Portswigger's list of web hacking techniques is a long-running celebration of curiosity and research from the web hacking community. James Kettle shares his thoughts on the entries from 2025 and how he expects LLMs and a

  3. The Human Aspect of Red Teams - Brian Fox, Tom Tovar, T. Gwyddon 'Data' Owen - ASW #379

    Apr 21, 20261h 13m

    Red team exercises set goals to see if a particular outcome can be accomplished through a simulated attack, but the ultimate outcome should be educating the org about how to improve tools and processes that make attacks

  4. Securing Software's Journey with the OWASP SPVS - Ido Geffen, Rohan Ravindranath, Cameron W., Farshad Abasi - ASW #378

    Apr 14, 20261h 9m

    It's one thing to write secure code, it's another to release it into the wild. That code needs to be designed, built, tested, released, and maintained. Farshad Abasi and Cameron Walters explain how the OWASP Secure Pipel

  5. AppSec News Roundup on Claude Code Leak, Axios NPM Compromise, Secure Design - Idan Plotnik, Raj Mallempati - ASW #377

    Apr 7, 20261h 8m

    Security problems aren't changing very much even though security teams are. We catch up on the implications of the Claude Code source leak, the very human lessons from the axios NPM compromise, and what secure design loo

  6. Developing the Skills Needed for Modern Software Development - Keith Hoodlet, Shashwat Sehgal, Ron Rasin - ASW #376

    Mar 31, 20261h 15m

    The future of secure software is going through a mix of skills expected of humans and skills files created for LLMs. We might even posit that appsec as a discipline will fade (and that might not even be a bad thing!). Ke

  7. Why Proactive Security Is Far Better Than Patching - Erik Nost - ASW #375

    Mar 24, 202638m

    So much of appsec's efforts can be consumed by vuln management and a race to patch security flaws. But that's more a symptom of the ease of scanning and the volume of CVEs. Erik Nost walks through the principles behind p

  8. Creating Better Security Guidance and Code with LLMs - Mark Curphey - ASW #374

    Mar 17, 20261h 4m

    What happens when secure coding guidance goes stale? What happens LLMs write code from scratch? Mark Curphy walks us through his experience updating documentation for writing secure code in Go and recreating one of his o

  9. Making Medical Devices Secure - Tamil Mathi - ASW #373

    Mar 10, 20261h 3m

    Medical devices are a special segment of the IoT world where availability and patient safety are paramount. Tamil Mathi explains why many devices need to fail open -- the opposite of what traditional appsec approaches mi

  10. Modern AppSec that keeps pace with AI development - James Wickett - ASW #372

    Mar 3, 202647m

    As more developers turn to LLMs to generate code, more appsec teams are turning to LLMs to conduct security code reviews. One of the biggest themes in all the discussion around LLMs, agents, and code is speed -- more cod

  11. Helping Users with Practical Advice to Protect their Digital Devices - Runa Sandvik - ASW #371

    Feb 24, 20261h 0m

    Journalists put a lot of effort into collecting information and protecting their sources, but everyone can benefit from having a digital environment that's more secure and more privacy protecting. Runa Sandvik shares her

  12. Conducting Secure Code Analysis with LLMs - ASW #370

    Feb 17, 202646m

    A major premise of appsec is figuring out effective ways to answer the question, "What security flaws are in this code?" The nature of the question doesn't really change depending on who or what wrote the code. In other

  13. Bringing Strong Authentication and Granular Authorization for GenAI - Dan Moore - ASW #369

    Feb 10, 20261h 9m

    When it comes to agents and MCPs, the interesting security discussion isn't that they need strong authentication and authorization, but what that authn/z story should look like, where does it get implemented, and who imp

  14. Focusing on Proactive Controls in the Face of LLM-Assisted Malware - Rob Allen - ASW #368

    Feb 3, 20261h 7m

    Everyone is turning to LLMs to generate code, including attackers. Thus, it's no great surprise that there are now examples of malware generated by LLMs. We discuss the implications of more malware with Rob Allen and wha

  15. Building proactive defenses that reflect the true nature of modern software risk - Paul Davis - ASW #367

    Jan 27, 20261h 13m

    Supply chain security remains one of the biggest time sinks for appsec teams and developers, even making it onto the latest iteration of the OWASP Top 10 list. Paul Davis joins us to talk about strategies to proactively

  16. Lessons from MongoBleed, CWE Top 25, and Secure Coding Benchmarks - ASW #366

    Jan 20, 202644m

    MongoBleed and a recent OWASP CRS bypass show how parsing problems remain a source of security flaws regardless of programming language. We talk with Kalyani Pawar about how these problems rank against the Top 25 CWEs fo

  17. Secure By Design Is Better Than Secure By Myth - Bob Lord - ASW #365

    Jan 13, 202653m

    Not all infosec advice is helpful. Bad advice wastes time, makes people less secure, and takes focus away from making software more secure. Bob Lord talks about his efforts to tamp down hacklore -- the security myths and

  18. The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364

    Jan 6, 20261h 10m

    Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to deal

  19. AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363

    Dec 30, 20251h 6m

    In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (C

  20. Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362

    Dec 23, 20251h 7m

    Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handli

  21. Developing Open Source Skills for Maintaining Projects - Kat Cosgrove - ASW #361

    Dec 16, 20251h 3m

    Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underly

  22. Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360

    Dec 9, 20251h 7m

    The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Cl

  23. Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

    Dec 2, 202559m

    For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational an

  24. Figuring Out Where to Start with Secure Code - ASW #358

    Nov 25, 202546m

    What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in cra

  25. Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357

    Nov 18, 20251h 3m

    Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching cr