156 subscribers
Looks like the publisher may have taken this series offline or changed its URL. Please contact support if you believe it should be working, the feed URL is invalid, or you have any other concerns about it.
Go offline with the Player FM app!
In Search of Secure Design - ASW #325
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on May 04, 2025 11:13 (
What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 475886705 series 72776
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those practices address important areas of risk, but only indirectly influence a secure design. We look at tactics from coding styles to design councils as we search for guidance that makes software more secure.
Segment resources
- https://owasp.org/Top10/A042021-InsecureDesign/
- https://www.cisa.gov/securebydesign/pledge
- https://www.cisa.gov/securebydesign
- https://kccnceu2025.sched.com/event/1xBJR/keynote-rust-in-the-linux-kernel-a-new-era-for-cloud-native-performance-and-security-greg-kroah-hartman-linux-kernel-maintainer-fellow-the-linux-foundation
- https://newsletter.pragmaticengineer.com/p/how-linux-is-built-with-greg-kroah
- https://daniel.haxx.se/blog/2025/04/07/writing-c-for-curl/
Show Notes: https://securityweekly.com/asw-325
4516 episodes
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on May 04, 2025 11:13 (
What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 475886705 series 72776
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those practices address important areas of risk, but only indirectly influence a secure design. We look at tactics from coding styles to design councils as we search for guidance that makes software more secure.
Segment resources
- https://owasp.org/Top10/A042021-InsecureDesign/
- https://www.cisa.gov/securebydesign/pledge
- https://www.cisa.gov/securebydesign
- https://kccnceu2025.sched.com/event/1xBJR/keynote-rust-in-the-linux-kernel-a-new-era-for-cloud-native-performance-and-security-greg-kroah-hartman-linux-kernel-maintainer-fellow-the-linux-foundation
- https://newsletter.pragmaticengineer.com/p/how-linux-is-built-with-greg-kroah
- https://daniel.haxx.se/blog/2025/04/07/writing-c-for-curl/
Show Notes: https://securityweekly.com/asw-325
4516 episodes
All episodes
×

1 Security Weekly News Interviews Leaders of NECCDC competition - SWN #473 32:02


1 AI Tips, Tricks, and Traps! - PSW #872 1:37:21


1 Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393 49:58


1 Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472 33:34


1 Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328 44:08


1 The Future of Access Management - Jeff Shiner - ESW #404 39:05


1 The reason for Zoom's outage is crazy, huge funding amounts before RSA - ESW #404 40:37


1 Reviewing the Verizon 2025 Data Breach Investigations Report - ESW #404 40:42


1 Beating the AI Game, Ripple, Numerology, Darcula, Special Guests from Hidden Layer... - Malcolm Harkins, Kasimir Schulz - SWN #471 34:02


1 Hacking Crosswalks and Attacking Boilers - PSW #871 2:04:15


1 ISO 42001 Certification, CIOs Struggle to Align Strategies, and CISOs Rethink Hiring - Martin Tschammer - BSW #392 1:03:55


1 Brains, Elusive Comet, AI Scams, Microsoft Dog Food, Deleting Yourself, Josh Marpet - SWN #470 31:59


1 Managing Secrets - Vlad Matsiiako - ASW #327 1:03:03


1 Tailscale rakes it in, CVE dead to us, cool Chrome extensions, dog saves toddler - ESW #403 57:56


1 The past, present, and future of enterprise AI - Pravi Devineni - ESW #403 39:13
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.