Artwork

محتوای ارائه شده توسط Tejas Kumar. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Tejas Kumar یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

Liran Tal: How to Secure Your Apps and AI Agents

1:33:23
 
اشتراک گذاری
 

Manage episode 493171454 series 3676184
محتوای ارائه شده توسط Tejas Kumar. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Tejas Kumar یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Links

- Codecrafters (partner): https://tej.as/codecrafters

- Snyk: https://snyk.io/

- Liran on X: https://x.com/liran_tal

- Tejas on X: https://x.com/tejaskumar_


Summary


In this conversation, we explore the complexities of software security, particularly focusing on the challenges posed by Node.js and the broader software supply chain. We discuss the evolution of security practices, the importance of awareness among developers, and the role of automation in enhancing security measures. The conversation highlights the need for a balance between automated tools and manual audits, emphasizing that human oversight remains crucial in high-risk environments.


We also explore the vulnerabilities associated with open-source software and the trust developers place in third-party tools and extensions, specifically the importance of SBOMs in understanding software dependencies. We discuss the SolarWinds attack as a pivotal case in supply chain security and the role of tools like lockfile lint in enforcing security policies.


Finally, we discuss AI and the role of LLMs in security, particularly regarding attack vectors and the reliability of AI-generated code.


Chapters


00:00 Liran Tal

01:44 Introduction to Security in Software Development

04:53 The Evolution of Node.js and Security Challenges

07:29 Understanding Software Supply Chain Vulnerabilities

10:49 The Role of Open Source in Security

13:51 Exploring Security in Development Tools and Extensions

16:40 The Importance of Security Awareness and Training

19:40 Automating Security: Tools and Best Practices

22:30 The Balance Between Automation and Manual Audits

25:43 Conclusion and Future of Security in Software Development

35:00 Balancing Automation and Human Intervention in Security

38:08 Understanding S-BOMs and Their Importance

41:14 The SolarWinds Attack: A Case Study in Supply Chain Security

43:29 Lockfile Lint: Enforcing Security Policies in Code

46:49 Generating SBOMs: A Practical Approach

49:03 Demystifying CVSS: Understanding Vulnerability Scoring

52:50 AI in Security: Attack Vectors and Defense Strategies

59:52 Navigating Security in AI-Generated Code

01:05:39 The Role of LLMs in Security Vulnerability Detection

01:08:24 Integrating Agents for Secure Code Generation

01:11:16 Challenges of LLMs in Security Validation

01:14:42 The Complexity of Security in AI Systems

01:20:56 Understanding Fuzzing and AI's Role

01:24:08 Container Breakout Threats and Mitigation Strategies


Hosted on Acast. See acast.com/privacy for more information.

  continue reading

88 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 493171454 series 3676184
محتوای ارائه شده توسط Tejas Kumar. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Tejas Kumar یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Links

- Codecrafters (partner): https://tej.as/codecrafters

- Snyk: https://snyk.io/

- Liran on X: https://x.com/liran_tal

- Tejas on X: https://x.com/tejaskumar_


Summary


In this conversation, we explore the complexities of software security, particularly focusing on the challenges posed by Node.js and the broader software supply chain. We discuss the evolution of security practices, the importance of awareness among developers, and the role of automation in enhancing security measures. The conversation highlights the need for a balance between automated tools and manual audits, emphasizing that human oversight remains crucial in high-risk environments.


We also explore the vulnerabilities associated with open-source software and the trust developers place in third-party tools and extensions, specifically the importance of SBOMs in understanding software dependencies. We discuss the SolarWinds attack as a pivotal case in supply chain security and the role of tools like lockfile lint in enforcing security policies.


Finally, we discuss AI and the role of LLMs in security, particularly regarding attack vectors and the reliability of AI-generated code.


Chapters


00:00 Liran Tal

01:44 Introduction to Security in Software Development

04:53 The Evolution of Node.js and Security Challenges

07:29 Understanding Software Supply Chain Vulnerabilities

10:49 The Role of Open Source in Security

13:51 Exploring Security in Development Tools and Extensions

16:40 The Importance of Security Awareness and Training

19:40 Automating Security: Tools and Best Practices

22:30 The Balance Between Automation and Manual Audits

25:43 Conclusion and Future of Security in Software Development

35:00 Balancing Automation and Human Intervention in Security

38:08 Understanding S-BOMs and Their Importance

41:14 The SolarWinds Attack: A Case Study in Supply Chain Security

43:29 Lockfile Lint: Enforcing Security Policies in Code

46:49 Generating SBOMs: A Practical Approach

49:03 Demystifying CVSS: Understanding Vulnerability Scoring

52:50 AI in Security: Attack Vectors and Defense Strategies

59:52 Navigating Security in AI-Generated Code

01:05:39 The Role of LLMs in Security Vulnerability Detection

01:08:24 Integrating Agents for Secure Code Generation

01:11:16 Challenges of LLMs in Security Validation

01:14:42 The Complexity of Security in AI Systems

01:20:56 Understanding Fuzzing and AI's Role

01:24:08 Container Breakout Threats and Mitigation Strategies


Hosted on Acast. See acast.com/privacy for more information.

  continue reading

88 قسمت

همه قسمت ها

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش