80 subscribers
با برنامه Player FM !
پادکست هایی که ارزش شنیدن دارند
حمایت شده


Securing Shadow Apps & Protecting Data - Guy Guzner, Pranava Adduri - ASW Vault
Manage episode 420802277 series 2086045
With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it’s more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single Sign-On (SSO). So the question becomes, “How do you enable the business while still providing security oversight and governance?”
This segment is sponsored by Savvy. Visit https://securityweekly.com/savvy to learn more about them!
CISOs encounter challenges in securing data amidst the rapid growth driven by Cloud and GenAI applications. In this segment, we will delve into how Bedrock Security powers frictionless data security, empowering CISOs to securely manage data sprawl, allowing their businesses to operate at optimal speed, without compromising security.
Segment Resources:
Bedrock Security: https://www.bedrock.security/
Bedrock Security X/Twitter: https://twitter.com/bedrocksec
Bedrock Security LinkedIn: https://www.linkedin.com/company/bedrocksec/
House Rx (customer) Case Study: https://tinyurl.com/35v48wx7
Introductory Whitepaper: https://tinyurl.com/5yjeu92b
Innovation Sandbox 2024: https://www.businesswire.com/news/home/20240402284910/en/Bedrock-Security-Named-RSA-Conference-2024-Innovation-Sandbox-Finalist
This segment is sponsored by Bedrock Security. Visit https://securityweekly.com/bedrockrsac to learn more about them!
Show Notes: https://securityweekly.com/vault-asw-10
346 قسمت
Manage episode 420802277 series 2086045
With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it’s more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single Sign-On (SSO). So the question becomes, “How do you enable the business while still providing security oversight and governance?”
This segment is sponsored by Savvy. Visit https://securityweekly.com/savvy to learn more about them!
CISOs encounter challenges in securing data amidst the rapid growth driven by Cloud and GenAI applications. In this segment, we will delve into how Bedrock Security powers frictionless data security, empowering CISOs to securely manage data sprawl, allowing their businesses to operate at optimal speed, without compromising security.
Segment Resources:
Bedrock Security: https://www.bedrock.security/
Bedrock Security X/Twitter: https://twitter.com/bedrocksec
Bedrock Security LinkedIn: https://www.linkedin.com/company/bedrocksec/
House Rx (customer) Case Study: https://tinyurl.com/35v48wx7
Introductory Whitepaper: https://tinyurl.com/5yjeu92b
Innovation Sandbox 2024: https://www.businesswire.com/news/home/20240402284910/en/Bedrock-Security-Named-RSA-Conference-2024-Innovation-Sandbox-Finalist
This segment is sponsored by Bedrock Security. Visit https://securityweekly.com/bedrockrsac to learn more about them!
Show Notes: https://securityweekly.com/vault-asw-10
346 قسمت
همه قسمت ها
×
1 AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332 1:04:35

1 Appsec News & Interviews from RSAC on Identity and AI - Rami Saas, Charlotte Wylie - ASW #331 1:01:48

1 Secure Code Reviews, LLM Coding Assistants, and Trusting Code - Rey Bango, Karim Toubba, Gal Elbaz - ASW #330 1:09:38

1 AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Vishal Gupta, Idan Plotnik - ASW #329 1:03:03

1 Managing Secrets - Vlad Matsiiako - ASW #327 1:03:03

1 More WAFs in Blocking Mode and More Security Headaches from LLMs - Sandy Carielli, Janet Worthington - ASW #326 1:14:45

1 In Search of Secure Design - ASW #325 1:07:36

1 Avoiding Appsec's Worst Practices - ASW #324 1:11:19

1 CISA's Secure by Design Principles, Pledge, and Progress - Jack Cable - ASW #321 1:13:50

1 Keeping Curl Successful and Secure Over the Decades - Daniel Stenberg - ASW #320 1:09:02

1 Developer Environments, Developer Experience, and Security - Dan Moore - ASW #319 1:10:21

1 Code Scanning That Works With Your Code - Scott Norberg - ASW #317 1:12:52

1 Threat Modeling That Helps the Business - Akira Brand, Sandy Carielli - ASW #316 1:11:39

1 Security the AI SDLC - Niv Braun - ASW #315 1:08:34

1 Discussing Useful Security Requirements with Developers - Ixchel Ruiz - ASW #313 1:07:41

1 DefectDojo and Bringing Quality Appsec Tools to Small Appsec Teams - Greg Anderson - ASW #312 1:07:10

1 Applying Usability and Transparency to Security - Hannah Sutor - ASW #311 1:09:42

1 Adding Observability with OpenTelemetry - Adriana Villela - ASW #309 1:10:55

1 Biometric Frontiers: Unlocking The Future Of Engagement - Andras Cser, Enza Iannopollo - ASW #308 1:10:32

1 Modernizing AppSec - Melinda Marks - ASW #307 1:09:29

1 Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306 1:05:35

1 Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305 1:22:48

1 The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304 1:17:25

1 The Future of Zed Attack Proxy - Simon Bennetts, Ori Bendet - ASW #302 1:12:35

1 More Car Hacks, CUPS Vulns, Microsoft's SFI, Memory Safety, Password Complexity - Farshad Abasi - ASW #301 45:57

1 Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300 1:07:51

1 Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299 1:02:26



1 Changing the Course of IoT's Future from Its Insecure Past - Paddy Harrington - ASW #297 1:04:28

1 The Fallout and Lessons Learned from the CrowdStrike Fiasco - Shimon Modi, Jeff Pollard, Allie Mellen, Boaz Barzel - ASW #296 1:21:54

1 When Appsec Needs to Start Small - Kalyani Pawar, Danny Jenkins, Nikos Kiourtis - ASW #295 1:08:53

1 Building Successful Security Champions Programs - Marisa Fagan - ASW #294 1:10:17


1 Where Generative AI Can Actually Help Security (And Where It Doesn't) - Farshad Abasi, Allie Mellen - ASW #292 1:05:00

1 Producing Secure Code by Leveraging AI - Stuart McClure - ASW #291 1:09:02

1 State Of Application Security 2024 - Sandy Carielli, Janet Worthington - ASW #290 1:12:41

1 OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289 1:01:09


1 Open Source Software Supply Chain Security & The Real Crisis Behind XZ Utils - Idan Plotnik, Luis Villa, Erez Hasson - ASW #287 1:12:08



1 Node.js Secure Coding - Oliver Tavakoli, Chris Thomas, Liran Tal - ASW #286 1:09:05

1 Inside the OWASP Top 10 for LLM Applications - Sandy Dunn, Mike Fey, Josh Lemos - ASW #285 1:06:40

1 AI & Hype & Security (Oh My!) & Hacking AI Bias - Caleb Sima, Keith Hoodlet - ASW #284 1:04:57

1 Why Companies Continue to Struggle with Supply Chain Security - Melinda Marks - ASW #283 1:19:42

1 Sustainable Funding of Open Source Tools - Mark Curphey, Simon Bennetts - ASW #282 1:17:57

1 Demystifying Security Engineering Career Tracks - Karan Dwivedi - ASW #281 1:03:23

1 Lessons That The XZ Utils Backdoor Spells Out - Farshad Abasi - ASW #280 1:00:18

1 Infosec Myths, Mistakes, and Misconceptions - Adrian Sanabria - ASW #279 1:00:57

1 Successful Security Needs a Streamlined UX - Benedek Gagyi - ASW #278 1:09:03

1 Figuring Out Where Appsec Fits When Starting a Cybersecurity Program - Tyler VonMoll - ASW #277 1:13:20

1 More API Calls, More Problems: The State of API Security in 2024 - Lebin Cheng - ASW #276 1:12:17

1 The Simple Mistakes and Complex Seeds of a Vulnerability Management Program - Emily Fox - ASW #275 1:19:26



1 Creating Code Security Through Better Visibility - Christien Rioux - ASW #273 1:23:48

1 Starting an OWASP Project (That's Not a List!) - Grant Ongers - ASW #272 1:14:25

1 Getting Your First Conference Presentation - Sarah Harvey - ASW #271 1:19:14

1 Dealing with the Burden of Bad Bots - Sandy Carielli - ASW #270 1:08:35


1 What's in Store for 2024? - ASW #268 1:11:20

1 HTTP RFCs Have Evolved, Breaking Into Cloud, Scaling AppSec at Netflix, & Confluence - Keith Hoodlet - ASW Vault 33:32


1 Making Service Meshes Work for People - Idit Levine - ASW #267 1:17:40

1 The ABCs of RFCs - Heather Flanagan - ASW #266 1:18:02

1 All the News - Just Six Months Later - Application Security Weekly #265 1:10:21

1 Starting with Appsec -- Is It More of a Position or a Process? - ASW #264 1:13:48


1 How 2023 Changed Application Security and What’s to Come in 2024 - Karl Triebes - ASW #263 1:15:21

1 Security from a Developer's Perspective - Josh Goldberg - ASW #262 1:11:22

1 How Security Tools Must Evolve - Dan Kuykendall - ASW #261 1:26:44

1 OAuth, WebAuthn, & The Impact of Design Choices - Dan Moore - ASW #260 1:18:22

1 OT Security - Huxley Barbee - ASW #259 1:18:56

1 Shifting Focus to Make DevSecOps Successful - Janet Worthington - ASW #258 1:16:35

1 Creating Presentations and Training That Engage an Audience - Lina Lau - ASW #257 1:26:02

1 Supply Chain Security Security with Containers and CI/CD Systems - Kirsten Newcomer - #ASW 256 1:27:11

1 Stopping Business Logic Attacks: Why a WAF is no Longer Enough - Karl Triebes - ASW #255 1:15:53

1 Building a Scanner and a Community with Zed Attack Proxy - Simon Bennetts - ASW #254 1:13:02


1 How Can Security Be Smart About Using AI? - Jeff Pollard - ASW #253 1:13:57


1 Pointers and Perils for Presentations - Josh Goldberg - ASW #251 1:24:48
به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.