Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizations of all sizes with their cybersecurity needs. If you’re an AppSec professional looking for an opportunity to work with some of the best in the ...
…
continue reading

1
What Existing AWS Services are Important to AppSec? (Part 1 of 2) | The AppSec Insiders Ep.14
26:00
26:00
Play later
Play later
Lists
Like
Liked
26:00Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizati…
…
continue reading

1
What Existing AWS Services are Important to AppSec? (Part 2 of 2) | The AppSec Insiders Ep.15
33:28
33:28
Play later
Play later
Lists
Like
Liked
33:28Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizati…
…
continue reading
In this episode, we discuss 2023 Security Threats & Newcomers RecapBy Farshad Abasi
…
continue reading

1
The AppSec Insiders Ep. 11 - Flipper Zero and IoT Security
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59In this episode, we discuss the Flipper Zero and IoT Security.By Farshad Abasi
…
continue reading

1
Exploring the Challenges of Testing Against the ASVS Standard - Part 4
31:20
31:20
Play later
Play later
Lists
Like
Liked
31:20In this episode, we return to the topic from the previous episodes and continue explore the challenges of testing against the ASVS standard.By Farshad Abasi
…
continue reading

1
Exploring the Challenges of Testing Against the ASVS Standard - Part 3
33:53
33:53
Play later
Play later
Lists
Like
Liked
33:53In this episode, we explore the challenges of testing against the ASVS standard - Part 3By Farshad Abasi
…
continue reading

1
Exploring the Challenges of Testing Against the ASVS Standard - Part 2
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35In this episode, we continue to explore the challenges of testing against the ASVS standard.By Farshad Abasi
…
continue reading

1
Software Composition Analysis (SCA) & Supply Chain Security feat. Oscar van der Meer from MergeBase
40:45
40:45
Play later
Play later
Lists
Like
Liked
40:45In this episode, we sit down with Oscar van der Meer, Founder and CEO of MergeBase to discuss Software Composition Analysis (SCA) and why it is important for supply chain security.By Farshad Abasi
…
continue reading

1
Azure Security: Raising Alarms and Reducing the Blast Radius
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21In this episode we explore Azure Security: Raising Alarms and Reducing the Blast Radius.By Farshad Abasi
…
continue reading
In this episode we explore AWS SRA (Secure Reference Architecture).By Farshad Abasi
…
continue reading

1
Exploring the Challenges of Testing Against the ASVS Standard
38:07
38:07
Play later
Play later
Lists
Like
Liked
38:07In this episode, we explore the challenges of testing against the ASVS standard.By Farshad Abasi
…
continue reading

1
ChatGPT and the Future of Application Security
19:36
19:36
Play later
Play later
Lists
Like
Liked
19:36In this episode, we dive deep into the world of ChatGPT and AI technology. What does this mean for application security?By Farshad Abasi
…
continue reading
In this episode, we explore OWASP Top 10 and the potential attacks on the CI/CD (part 1).By Farshad Abasi
…
continue reading
In this episode, we continue our discussion about OWASP Top 10 and attacks on the CI/CD pipeline.By Farshad Abasi
…
continue reading