71 subscribers
با برنامه Player FM !
پادکست هایی که ارزش شنیدن دارند
حمایت شده


Node.js Secure Coding - Oliver Tavakoli, Chris Thomas, Liran Tal - ASW #286
Manage episode 419529197 series 2086045
Secure coding education should be more than a list of issues or repeating generic advice. Liran Tal explains his approach to teaching developers through examples that start with exploiting known vulns and end with discussions on possible fixes. Not only does this create a more engaging experience, but it also relies on code that looks familiar to developers rather than contrived or overly simplistic examples.
Segment resources:
- https://github.com/lirantal
- https://cheatsheetseries.owasp.org/cheatsheets/NPMSecurityCheat_Sheet.html
- https://lirantal.com/blog/poor-express-authentication-patterns-nodejs
The challenge of evaluating threat alerts in aggregate – what a collection and sequence of threat signals tell us about an attacker’s sophistication and motives – has bedeviled SOC teams since the dawn of the Iron Age. Vectra AI CTO Oliver Tavakoli will discuss how the design principles of our XDR platform deal with this challenge and how GenAI impacts this perspective.
Segment Resources:
Vectra AI Platform Video: https://vimeo.com/916801622
Blog: https://www.vectra.ai/blog/what-is-xdr-the-promise-of-xdr-capabilities-explained
Blog: https://www.vectra.ai/blog/xdr-explored-the-evolution-and-impact-of-extended-detection-and-response
MXDR Calculator: https://www.vectra.ai/calculators/mxdr-value-calculator
This segment is sponsored by Vectra AI. Visit https://securityweekly.com/vectrarsac to learn more about them!
In this interview, we will discuss the network security challenges of business applications and how they can also be the solution. AlgoSec has spent over two decades tackling tough security issues in some of the world’s most complex networks. Now, they’re applying their expertise to hybrid networks—where customers are combining their on-premise resources along with multiple cloud providers.
Segment Resources: https://www.algosec.com/resources/
This segment is sponsored by AlgoSec. Visit https://securityweekly.com/algosecrsac to learn more about them!
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw-286
359 قسمت
Manage episode 419529197 series 2086045
Secure coding education should be more than a list of issues or repeating generic advice. Liran Tal explains his approach to teaching developers through examples that start with exploiting known vulns and end with discussions on possible fixes. Not only does this create a more engaging experience, but it also relies on code that looks familiar to developers rather than contrived or overly simplistic examples.
Segment resources:
- https://github.com/lirantal
- https://cheatsheetseries.owasp.org/cheatsheets/NPMSecurityCheat_Sheet.html
- https://lirantal.com/blog/poor-express-authentication-patterns-nodejs
The challenge of evaluating threat alerts in aggregate – what a collection and sequence of threat signals tell us about an attacker’s sophistication and motives – has bedeviled SOC teams since the dawn of the Iron Age. Vectra AI CTO Oliver Tavakoli will discuss how the design principles of our XDR platform deal with this challenge and how GenAI impacts this perspective.
Segment Resources:
Vectra AI Platform Video: https://vimeo.com/916801622
Blog: https://www.vectra.ai/blog/what-is-xdr-the-promise-of-xdr-capabilities-explained
Blog: https://www.vectra.ai/blog/xdr-explored-the-evolution-and-impact-of-extended-detection-and-response
MXDR Calculator: https://www.vectra.ai/calculators/mxdr-value-calculator
This segment is sponsored by Vectra AI. Visit https://securityweekly.com/vectrarsac to learn more about them!
In this interview, we will discuss the network security challenges of business applications and how they can also be the solution. AlgoSec has spent over two decades tackling tough security issues in some of the world’s most complex networks. Now, they’re applying their expertise to hybrid networks—where customers are combining their on-premise resources along with multiple cloud providers.
Segment Resources: https://www.algosec.com/resources/
This segment is sponsored by AlgoSec. Visit https://securityweekly.com/algosecrsac to learn more about them!
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw-286
359 قسمت
همه قسمت ها
×
1 Translating Security Regulations into Secure Projects - Roman Zhukov, Emily Fox - ASW #345 1:13:31

1 Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344 1:08:17


1 Uniting software development and application security - Will Vandevanter, Jonathan Schneider - ASW #342 58:07

1 How Product-Led Security Leads to Paved Roads - Julia Knecht - ASW #341 1:04:11

1 Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340 1:06:35

1 Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339 1:07:50

1 Checking in on the State of Appsec in 2025 - Janet Worthington, Sandy Carielli - ASW #338 1:07:15


1 How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336 1:01:18

1 Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335 1:08:00

1 Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334 1:09:09


1 AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332 1:04:35

1 Appsec News & Interviews from RSAC on Identity and AI - Rami Saas, Charlotte Wylie - ASW #331 1:01:48

1 Secure Code Reviews, LLM Coding Assistants, and Trusting Code - Rey Bango, Karim Toubba, Gal Elbaz - ASW #330 1:09:38

1 AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Vishal Gupta, Idan Plotnik - ASW #329 1:03:03


1 Managing Secrets - Vlad Matsiiako - ASW #327 1:03:03

1 More WAFs in Blocking Mode and More Security Headaches from LLMs - Sandy Carielli, Janet Worthington - ASW #326 1:14:45

1 In Search of Secure Design - ASW #325 1:07:36

1 Avoiding Appsec's Worst Practices - ASW #324 1:11:19



1 CISA's Secure by Design Principles, Pledge, and Progress - Jack Cable - ASW #321 1:13:50

1 Keeping Curl Successful and Secure Over the Decades - Daniel Stenberg - ASW #320 1:09:02

1 Developer Environments, Developer Experience, and Security - Dan Moore - ASW #319 1:10:21


1 Code Scanning That Works With Your Code - Scott Norberg - ASW #317 1:12:52

1 Threat Modeling That Helps the Business - Akira Brand, Sandy Carielli - ASW #316 1:11:39

1 Security the AI SDLC - Niv Braun - ASW #315 1:08:34

1 Discussing Useful Security Requirements with Developers - Ixchel Ruiz - ASW #313 1:07:41

1 DefectDojo and Bringing Quality Appsec Tools to Small Appsec Teams - Greg Anderson - ASW #312 1:07:10

1 Applying Usability and Transparency to Security - Hannah Sutor - ASW #311 1:09:42

1 Adding Observability with OpenTelemetry - Adriana Villela - ASW #309 1:10:55

1 Biometric Frontiers: Unlocking The Future Of Engagement - Andras Cser, Enza Iannopollo - ASW #308 1:10:32

1 Modernizing AppSec - Melinda Marks - ASW #307 1:09:29

1 Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306 1:05:35

1 Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305 1:22:48

1 The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304 1:17:25

1 The Future of Zed Attack Proxy - Simon Bennetts, Ori Bendet - ASW #302 1:12:35

1 More Car Hacks, CUPS Vulns, Microsoft's SFI, Memory Safety, Password Complexity - Farshad Abasi - ASW #301 45:57

1 Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300 1:07:51

1 Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299 1:02:26



1 Changing the Course of IoT's Future from Its Insecure Past - Paddy Harrington - ASW #297 1:04:28

1 The Fallout and Lessons Learned from the CrowdStrike Fiasco - Shimon Modi, Jeff Pollard, Allie Mellen, Boaz Barzel - ASW #296 1:21:54

1 When Appsec Needs to Start Small - Kalyani Pawar, Danny Jenkins, Nikos Kiourtis - ASW #295 1:08:53

1 Building Successful Security Champions Programs - Marisa Fagan - ASW #294 1:10:17


1 Where Generative AI Can Actually Help Security (And Where It Doesn't) - Farshad Abasi, Allie Mellen - ASW #292 1:05:00

1 Producing Secure Code by Leveraging AI - Stuart McClure - ASW #291 1:09:02

1 State Of Application Security 2024 - Sandy Carielli, Janet Worthington - ASW #290 1:12:41

1 OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289 1:01:09


1 Open Source Software Supply Chain Security & The Real Crisis Behind XZ Utils - Idan Plotnik, Luis Villa, Erez Hasson - ASW #287 1:12:08



1 Node.js Secure Coding - Oliver Tavakoli, Chris Thomas, Liran Tal - ASW #286 1:09:05

1 Inside the OWASP Top 10 for LLM Applications - Sandy Dunn, Mike Fey, Josh Lemos - ASW #285 1:06:40

1 AI & Hype & Security (Oh My!) & Hacking AI Bias - Caleb Sima, Keith Hoodlet - ASW #284 1:04:57

1 Why Companies Continue to Struggle with Supply Chain Security - Melinda Marks - ASW #283 1:19:42

1 Sustainable Funding of Open Source Tools - Mark Curphey, Simon Bennetts - ASW #282 1:17:57

1 Demystifying Security Engineering Career Tracks - Karan Dwivedi - ASW #281 1:03:23

1 Lessons That The XZ Utils Backdoor Spells Out - Farshad Abasi - ASW #280 1:00:18

1 Infosec Myths, Mistakes, and Misconceptions - Adrian Sanabria - ASW #279 1:00:57

1 Successful Security Needs a Streamlined UX - Benedek Gagyi - ASW #278 1:09:03

1 Figuring Out Where Appsec Fits When Starting a Cybersecurity Program - Tyler VonMoll - ASW #277 1:13:20

1 More API Calls, More Problems: The State of API Security in 2024 - Lebin Cheng - ASW #276 1:12:17

1 The Simple Mistakes and Complex Seeds of a Vulnerability Management Program - Emily Fox - ASW #275 1:19:26



1 Creating Code Security Through Better Visibility - Christien Rioux - ASW #273 1:23:48

1 Starting an OWASP Project (That's Not a List!) - Grant Ongers - ASW #272 1:14:25

1 Getting Your First Conference Presentation - Sarah Harvey - ASW #271 1:19:14

1 Dealing with the Burden of Bad Bots - Sandy Carielli - ASW #270 1:08:35


1 What's in Store for 2024? - ASW #268 1:11:20

1 HTTP RFCs Have Evolved, Breaking Into Cloud, Scaling AppSec at Netflix, & Confluence - Keith Hoodlet - ASW Vault 33:32


1 Making Service Meshes Work for People - Idit Levine - ASW #267 1:17:40

1 The ABCs of RFCs - Heather Flanagan - ASW #266 1:18:02

1 All the News - Just Six Months Later - Application Security Weekly #265 1:10:21

1 Starting with Appsec -- Is It More of a Position or a Process? - ASW #264 1:13:48


1 How 2023 Changed Application Security and What’s to Come in 2024 - Karl Triebes - ASW #263 1:15:21

1 Security from a Developer's Perspective - Josh Goldberg - ASW #262 1:11:22

1 How Security Tools Must Evolve - Dan Kuykendall - ASW #261 1:26:44

1 OAuth, WebAuthn, & The Impact of Design Choices - Dan Moore - ASW #260 1:18:22

1 OT Security - Huxley Barbee - ASW #259 1:18:56

1 Shifting Focus to Make DevSecOps Successful - Janet Worthington - ASW #258 1:16:35

1 Creating Presentations and Training That Engage an Audience - Lina Lau - ASW #257 1:26:02

1 Supply Chain Security Security with Containers and CI/CD Systems - Kirsten Newcomer - #ASW 256 1:27:11

1 Stopping Business Logic Attacks: Why a WAF is no Longer Enough - Karl Triebes - ASW #255 1:15:53

1 Building a Scanner and a Community with Zed Attack Proxy - Simon Bennetts - ASW #254 1:13:02


1 How Can Security Be Smart About Using AI? - Jeff Pollard - ASW #253 1:13:57


1 Pointers and Perils for Presentations - Josh Goldberg - ASW #251 1:24:48

1 You've Got Appsec, But Do You Have ArchSec? - Merritt Baer - ASW #250 1:15:19

1 Identity and Verifiable Credentials in Cars - Eve Maler - ASW #249 1:13:46

1 Navigating the Complexities of Development to Create Secure APIs - Kristen Bell - ASW #248 1:17:31

1 Securing Non-Election Election Systems, Modernizing AppSec Education - Brian Glas - ASW #247 1:20:50

1 Software Trust & Adversaries, Developer-Focused Security - Shannon Lietz, Melinda Marks - ASW #246 1:16:40

1 Latest Web Vulnerability Trends & Best Practices - Patrick Vandenberg - ASW #245 1:14:56


1 Enhancing Security: App Modernization, Identity Orchestration, & Big IAM Challenge - Eric Olden - ASW #244 1:19:57

1 What's the Deal with API Security? - Sandy Carielli - ASW #243 1:17:13


1 Ten Things I Hate About Lists - ASW #242 1:16:36

1 Securing the App Lifecycle: Strategies for Long-Term Software Security and Mitigating the Threat of Malicious Packages - ASW #241 1:07:38

1 From Security Theater to Resilience: Unveiling New Approaches to Application Security - ASW #240 1:10:35

1 Navigating the Complexities of Application Security: Vulnerability Management, Risk Mitigation, and Business Logic Attacks - ASW #239 1:20:42

1 Hackers and Policy: Empowering Users and Shaping Discussions at DEF CON, Jeff Moss - ASW #238 1:20:12

1 Bug Bounty Programs and Community Building: Unveiling Rewards, Challenges, and Exciting Adventures, Ben Sadeghipour (NahamSec) - ASW #237 1:10:44

1 Application Security in the Cloud: Safeguarding Data and Preventing Unauthorized Access, Vandana Verma Sehgal - ASW #236 1:11:10

1 eBPF: The Future of Security and Infrastructure Tools Revealed, Liz Rice - ASW #235 1:11:50

1 AI in Production: Unveiling Use Cases, Security Risks, and Real-Life Experiences, Frank Catucci - ASW #234 1:14:53

1 The Power of Static Analysis: Strengthening Application Security from Code Scrutiny, Josh Goldberg - ASW #233 1:17:28

1 ASW #232 - Josh Grossman 1:26:21

1 ASW #231 - Neatsun Ziv 1:20:29


1 ASW #229 - Nick Selby 1:21:27

1 ASW #228 - Adrian Sanabria 1:19:28

1 ASW #227 - Dr. David Movshovitz 1:12:28

1 ASW #226 - Marudhamaran Gunasekaran 1:17:51

1 Throwback Episode - Dev(Sec)Ops Scanning Challenges & Tips - ASW170 1:09:36

1 ASW #225 - Dan Moore 1:20:29

1 ASW #224 - Keith Hoodlet 1:16:36
به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.