The Security Table

By Izar Tarandach, Matt Coles, and Chris Romeo

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 5
Reviews: 0
Episodes: 100

Description

The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!


Episode Date
The Evolution Problem: After 100 Episodes, What’s Changed… and What Hasn’t?
Apr 01, 2026
The Agent Access Problem: When AI Has the Keys, Who’s Really in Control?
Mar 25, 2026
The Invisible Code Problem: When You Can’t See the Attack, Can You Stop It?
Mar 20, 2026
The Moltbook Dilemma: What Happens When AI Agents Start Networking
Feb 06, 2026
The Walking Dead of Security: When AI Resurrects the Build vs. Buy Debate
Jan 28, 2026
Crystal Penguins and AI Chaos: What Could Go Wrong in 2026?
Jan 14, 2026
The Cost of Knowing: How Cybersecurity Professionals View Innovation Differently
Dec 03, 2025
The Roller Coaster of Risk: A Threat Modeler's Perspective
Nov 26, 2025
Can AI Replace Security Teams? The Software Quality Debate
Nov 19, 2025
The Debate: Is the CIA Triad Truly Dead?
Oct 22, 2025
Don’t Forget the Beauty of Simplicity: Exploring Shifts in Software Development
Oct 08, 2025
More Cowbell: Security and Speed in Agile
Oct 01, 2025
Privateering the Cyber Seas: New Legislation on Cybercrime
Sep 24, 2025
Making Privacy Less Cringey
Sep 17, 2025
Decoding Mastro: AI Threat Modeling
Sep 10, 2025
Vibe Startups, AI Problems, and Matt’s Precious Computer
Aug 06, 2025
AI, AppSec and the Meaning of Life: The Answer is 42
Jul 30, 2025
Building the World's Largest Threat Model Library
Jul 09, 2025
Vibe Coding: Can You Put Your Trust in the Machine?
Jul 02, 2025
Traversing the Conference Circuit: Highlights and Insights
Jun 11, 2025
MCP…Something Could Go Wrong
Jun 03, 2025
Threat Modeling or Threat Intelligence, Are they the Same?
May 21, 2025
Skillset Over Experience: Rethinking Qualifications in Cybersecurity
Apr 23, 2025
Vibe Coding: What Could Possibly Go Wrong?
Mar 26, 2025
The Department of No
Feb 12, 2025
The Cyber Trust Mark Debate
Jan 22, 2025
Hovercrafts and the Evolution of AppSec in 2025
Jan 08, 2025
Find Your Conferences and watch Die Hard. And the Princess Bride.
Dec 11, 2024
Is it Necessary? Not everything requires an LLM
Dec 10, 2024
The STRIDE Controversy: Evolution vs. Extinction in Security Models
Nov 13, 2024
Why 100X Isn't the Answer
Nov 07, 2024
We'll Be Here Until We Become Obsolete
Oct 23, 2024
Everything is Boring
Oct 16, 2024
Experts Want to Excel
Oct 09, 2024
Numb to Data Breaches, and How it Impacts Security of the Average Feature
Sep 18, 2024
Philosophizing Cloud Security
Sep 11, 2024
Innovations in Threat Modeling?
Aug 28, 2024
The Illusion of Secure Software
Aug 14, 2024
The Intersection of Hardware and Software Security
Aug 07, 2024
Computing Has Trust Issues
Jul 31, 2024
The Stages of Grief in Incident Response
Jul 24, 2024
To SSH or Not?
Jul 17, 2024
Rethinking Security Conferences: Engagement and Innovation
Jul 03, 2024
Privacy vs. Security: Complexity at the Crossroads
Jun 18, 2024
Security, Stories, Jazz and Stage Presence with Brook Schoenfield
Jun 04, 2024
Debating the CISA Secure by Design Pledge
May 31, 2024
Why Developers Will Take Charge of Security, Tests in Prod
May 21, 2024
12 Factors of Threat Modeling
May 14, 2024
XZ and the Trouble with Covert Identities in Open Source
May 02, 2024
Nobody's Going To Mess with Our STRIDE
Apr 09, 2024
SQLi All Over Again?
Apr 02, 2024
How I Learned to Stop Worrying and Love the AI
Mar 26, 2024
Secure by Default in the Developer Toolset and DevEx
Mar 19, 2024
Debating the Priority and Value of Memory Safety
Mar 12, 2024
Selling Fear, Uncertainty, and Doubt
Feb 27, 2024
Prioritizing AppSec: A Conversation Between a VP of Eng, a Product Manager, and a Security "Pro"
Feb 20, 2024
Villainy, Open Source, and the Software Supply Chain
Feb 13, 2024
Adam Shostack -- Thinking like an Attacker and Risk Management in the Capabilities
Feb 06, 2024
Bug Bounty Theater and Responsible Bug Bounty
Jan 30, 2024
Threat Modeling Capabilities
Jan 23, 2024
Open Source Puppies and Beer
Jan 16, 2024
AppSec Resolutions
Jan 09, 2024
The Impact of Prompt Injection and HackAPrompt_AI in the Age of Security
Dec 19, 2023
Looking Back, Looking Forward
Nov 29, 2023
CVSS 4.0 Unleashed with Patrick Garrity
Nov 21, 2023
An SBOM Lifecycle
Nov 14, 2023
An SBOM Fable
Nov 08, 2023
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
Oct 24, 2023
The Future Role of Security and Shifting off the Table
Oct 17, 2023
A Show About Nothing that Turned into Something
Oct 10, 2023
The Hamster Wheel of Scan and Fix
Sep 26, 2023
Threat Modeling Conference
Sep 19, 2023
AppSec vs. ProdSec
Sep 12, 2023
Imposter Syndrome
Sep 05, 2023
The Return on Investment of Threat Modeling
Aug 29, 2023
Jim Manico ❤️ Threat Modeling: The Untold Story
Aug 22, 2023
Secure by Design
Aug 15, 2023
Security Champions as the Answer to Engineering Hating Security
Aug 01, 2023
Why Do Engineers Hate Security?
Jul 26, 2023
Security Posture is a Thing
Jul 18, 2023
Should #AppSec be Part of the Development Team?
Jul 10, 2023
Lack of Reasonable, or Everything That Is Wrong with Security Requirements
Jun 29, 2023
We Don't Know What We Don't Know
Jun 20, 2023
Privacy and the creepiness factor of collecting data
Jun 12, 2023
Security Guardrails and Paved Roads
Jun 05, 2023
Capture the Flag or NOT?
May 27, 2023
Simple Product Security Requirements
May 19, 2023
Reasonable Software Security: Do We Really Need DAST?
May 04, 2023
The Final Take on the National Cybersecurity Strategy: Software Liability And Privacy
Apr 27, 2023
A Convergence of AI in the World of Cybersecurity
Apr 03, 2023
The US National Cybersecurity Strategy -- Pillars One and Two
Mar 20, 2023
The US National Cybersecurity Strategy - Introduction - Part One
Mar 13, 2023
Application Security, Product Security, and what do we call this thing we do
Mar 05, 2023
Acronyms, Abbreviations, and a slide into Application Security
Feb 27, 2023
Security talent conclusion, from the candidates viewpoint
Feb 14, 2023
Security talent shortage — fact or fiction
Feb 07, 2023
Lastpass and the Security of Security Products
Jan 14, 2023
Software bill of materials -- what is it good for?
Jan 02, 2023
Should security give up on developers?
Dec 16, 2022
Security tools and the companies that make them
Dec 11, 2022