
ep2024-12 Tanya Janca: Happy Holidays are Secure Code
Some production issues caused this one to slip to December so the intro is a bit off but this is still a great episode. So, learn some lesso...
Radio and PodcastLive Radio & PodcastsOpening Radio and Podcast...

Radio and PodcastLive Radio & PodcastsFetching podcast shows and categories...
Radio and PodcastLive Radio & PodcastsFetching podcast episodes...

OWASP 24/7 is a recorded series of discussions with project leads within OWASP. Each week, we talk about the new projects that have come on board, updates to existing projects and interestin...

Some production issues caused this one to slip to December so the intro is a bit off but this is still a great episode. So, learn some lesso...

There's no reason to be scared about a pen test - especially when it's run by a professional like Brad Causey. I catch up with Brad in this...

What happens when you get interested in Threat Modeling and you want to share. For some, that means you do one work shop, then another, then...

The August episode is a review of projects from a recent OWASP project showcase. We talk to the leaders of the OWASP pytm, OWASP Developer G...

After a long and unplanned pause, the OWASP podast is back with a home run of an episode. We have Lisa Plaggemier as our guest who reprises...

After getting a ping from an old friend about a potential new OWASP project, I had to bring him on as a guest. He's got an interesting idea...

For years we've heard talk about a shortage of cybersecurity professionals so what can be done about that? In this episode, I speak to Brad...

In this episode we talk with Zain Haq and take a leap and bound over the first and second line to discover more about the third line - inter...

Software supply chain seems to be front and center for technologists, cybersecurity and many governments. One of the early pioneers in this...

In this episode I speak with Jerry Hoff who provides some very interesting perspective on application security especially at scale and from...

WAFs have been with us a while and it's about time someone reconsidered WAFs and their role in AppSec given the cloud-native and Kubernetes...

In this episode I speak with Aaron about Point of Sale or POS systems. He's been investigating the security of POS systems for quite some ti...

In this episode I speak with Amitai Cohen who's been thinking a lot about tenant isolation. This is a problem for more then just cloud provi...

In this episode, I speak with Caleb Queern, one of the authors of "Investments Unlimited" a book I highly recommend you get and read. While...

In this episode, I go solo and review the last year of podcasts but with a twist. I do my best to compare the topics covered to the OWASP Fl...

In this episode, I speak with Jimmy Mesta, the project leader of the new OWASP Kubernetes Top 10. Beyond covering the actual Kubernetes Top...

In this episode, I speak with Simon Bennetts, the creator of OWASP Zed Attack Proxy lovingly known as ZAP. We talk about how it all got star...

In this episode, Matt Tesauro hosts wirefall to talk about creating and growing a security community and his 26 years of pen testing experie...

In this episode, Matt Tesauro hosts Neil Matatall to talk about going beyond 2FA as he relates lessons learned from Twitter and Github on ac...

In this episode, Matt Tesauro hosts Greg Anderson and Cody Maffucci to talk about OWASP DefectDojo. DefectDojo is an OWASP flagship project...

In this episode, Matt Tesauro hosts David Gillman about JWT Patterns and Anti-Patterns. I first met David at LASCON in the fall of 2021 when...

In this episode, Matt Tesauro hosts Adam Shostack to talk about threat modeling - not only what it is but what Adam has learned from teachin...

Welcome back to the OWASP podcast. In this episode, we're headed to The VOID. I speak with Courtney Nash about the Verica Open Incident Data...

Hello, it's Matt Tesauro. Welcome back to my take on the OWASP Podcast. It seems as if I'm turning my episodes into the equivalent of a conf...

“I absolutely hate SAFe!” -- Bryan Finster That is Bryan Finster, Distinguished Engineer at Defense Unicorns out of Colorado Springs. I was...

Hello, I'm Matt Tesauro, one of the OWASP Podcast co-hosts. I had the opportunity to interview Tanya Janca for this podcast. To be honest, I...

8 years ago I took over the OWASP Podcast from Jim Manico, originator of the project. In that time over 160 episodes have been published, wi...

We’ve all heard of “Red Teams” and “Blue Teams” when it comes to cybersecurity. But what about the “Purple Team”, the “Yellow Team” or the “...

A couple weeks ago I read an article by Chris Roberts. The headline screamed, “Security Solved!” Security solved? What the hell was he talki...

In this episode of the People | Process | Technology podcast, I speak with Seba Deleersnyder from the Software Assurance Maturity Model, Car...

In this episode of the People | Process | Technology podcast, I speak with Simon Bennetts from the Zap Project, Christian Folini from the Mo...

In 2020, Security Magazine listed Sounil Yu as one of the most Influential People in Security in 2020, in part because of his work on the Cy...

The Top 10 is considered one of the most important community contributions to come out OWASP. In 2003, just two years after organization was...

When Shannon Lietz and the team at DevSecOps.org published the DevSecOps Manifesto six years ago, security was uppermost in their minds. The...

This is Mark Miller, Executive Producer. Over the years as I’ve produced the show, the topics of focus have followed the trends in the indus...

OWASP is in a state of discord. Over the past few years, there have been fractures in the community. Recently, there have been arguments on...

In this episode of the DevSecOps Podcast, we’re going to go off script and explore the LinkedIn algorithm. I could tie this back to DevSecOp...

When I read Richard Stiennon's latest article in Forbes, The Demise of Symantec, I thought it was absolutely fascinating. Richard walks thro...

Equifax is trying... I mean REALLY trying... to regain your trust. The Equifax CTO and CISO delivered the keynote at DevSecOps Days during 2...

If you like what you hear, you can download the entire book at sonatype.com/epicfailures As we were putting the finishing touches, getting r...

When Derek Weeks and I started All Day DevOps in 2016, we were unsure as to whether anyone would be interested.It's now four years later. La...

Shortly after watching the documentary, Code Rush, I met with Tara Hernandez, the hockey stick carrying lead of the Netscape project that wa...

Edwards Deming went to post-war Japan in the late 1940s to help with the census. While there, he built relationships with some of the main m...

Once a year, Sacha Labourey and I sit down to discuss the past year and what the coming year looks like for DevOps and Jenkins. As CEO of Cl...

I was affected by it. You were affected by it. We were all affected by the Equifax breach in September 2017. The truly interesting thing abo...

OWASP supports a global conference in North America each year, bringing together the projects, teams and chapters who make this one of the l...

The 2019 State of the Software Supply Chain Report was released on June 25th. The report is an analysis of the answers from over 5500 partic...

Let's not talk around the subject here... women are under represented when it comes to speaking or participating in tech conferences. It's a...

I produced my first concert at the San Anselmo Playhouse in 1979. It was the first in a series of events that has lasted 40 years. I have pr...

In April 2019, I was invited to host a panel at the International Conference on Cyber Engagement in Washington DC, to discuss "Securing the...