Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
| Episode | Date |
|---|---|
|
The Evolution Problem: After 100 Episodes, What’s Changed… and What Hasn’t?
|
Apr 01, 2026 |
|
The Agent Access Problem: When AI Has the Keys, Who’s Really in Control?
|
Mar 25, 2026 |
|
The Invisible Code Problem: When You Can’t See the Attack, Can You Stop It?
|
Mar 20, 2026 |
|
The Moltbook Dilemma: What Happens When AI Agents Start Networking
|
Feb 06, 2026 |
|
The Walking Dead of Security: When AI Resurrects the Build vs. Buy Debate
|
Jan 28, 2026 |
|
Crystal Penguins and AI Chaos: What Could Go Wrong in 2026?
|
Jan 14, 2026 |
|
The Cost of Knowing: How Cybersecurity Professionals View Innovation Differently
|
Dec 03, 2025 |
|
The Roller Coaster of Risk: A Threat Modeler's Perspective
|
Nov 26, 2025 |
|
Can AI Replace Security Teams? The Software Quality Debate
|
Nov 19, 2025 |
|
The Debate: Is the CIA Triad Truly Dead?
|
Oct 22, 2025 |
|
Don’t Forget the Beauty of Simplicity: Exploring Shifts in Software Development
|
Oct 08, 2025 |
|
More Cowbell: Security and Speed in Agile
|
Oct 01, 2025 |
|
Privateering the Cyber Seas: New Legislation on Cybercrime
|
Sep 24, 2025 |
|
Making Privacy Less Cringey
|
Sep 17, 2025 |
|
Decoding Mastro: AI Threat Modeling
|
Sep 10, 2025 |
|
Vibe Startups, AI Problems, and Matt’s Precious Computer
|
Aug 06, 2025 |
|
AI, AppSec and the Meaning of Life: The Answer is 42
|
Jul 30, 2025 |
|
Building the World's Largest Threat Model Library
|
Jul 09, 2025 |
|
Vibe Coding: Can You Put Your Trust in the Machine?
|
Jul 02, 2025 |
|
Traversing the Conference Circuit: Highlights and Insights
|
Jun 11, 2025 |
|
MCP…Something Could Go Wrong
|
Jun 03, 2025 |
|
Threat Modeling or Threat Intelligence, Are they the Same?
|
May 21, 2025 |
|
Skillset Over Experience: Rethinking Qualifications in Cybersecurity
|
Apr 23, 2025 |
|
Vibe Coding: What Could Possibly Go Wrong?
|
Mar 26, 2025 |
|
The Department of No
|
Feb 12, 2025 |
|
The Cyber Trust Mark Debate
|
Jan 22, 2025 |
|
Hovercrafts and the Evolution of AppSec in 2025
|
Jan 08, 2025 |
|
Find Your Conferences and watch Die Hard. And the Princess Bride.
|
Dec 11, 2024 |
|
Is it Necessary? Not everything requires an LLM
|
Dec 10, 2024 |
|
The STRIDE Controversy: Evolution vs. Extinction in Security Models
|
Nov 13, 2024 |
|
Why 100X Isn't the Answer
|
Nov 07, 2024 |
|
We'll Be Here Until We Become Obsolete
|
Oct 23, 2024 |
|
Everything is Boring
|
Oct 16, 2024 |
|
Experts Want to Excel
|
Oct 09, 2024 |
|
Numb to Data Breaches, and How it Impacts Security of the Average Feature
|
Sep 18, 2024 |
|
Philosophizing Cloud Security
|
Sep 11, 2024 |
|
Innovations in Threat Modeling?
|
Aug 28, 2024 |
|
The Illusion of Secure Software
|
Aug 14, 2024 |
|
The Intersection of Hardware and Software Security
|
Aug 07, 2024 |
|
Computing Has Trust Issues
|
Jul 31, 2024 |
|
The Stages of Grief in Incident Response
|
Jul 24, 2024 |
|
To SSH or Not?
|
Jul 17, 2024 |
|
Rethinking Security Conferences: Engagement and Innovation
|
Jul 03, 2024 |
|
Privacy vs. Security: Complexity at the Crossroads
|
Jun 18, 2024 |
|
Security, Stories, Jazz and Stage Presence with Brook Schoenfield
|
Jun 04, 2024 |
|
Debating the CISA Secure by Design Pledge
|
May 31, 2024 |
|
Why Developers Will Take Charge of Security, Tests in Prod
|
May 21, 2024 |
|
12 Factors of Threat Modeling
|
May 14, 2024 |
|
XZ and the Trouble with Covert Identities in Open Source
|
May 02, 2024 |
|
Nobody's Going To Mess with Our STRIDE
|
Apr 09, 2024 |
|
SQLi All Over Again?
|
Apr 02, 2024 |
|
How I Learned to Stop Worrying and Love the AI
|
Mar 26, 2024 |
|
Secure by Default in the Developer Toolset and DevEx
|
Mar 19, 2024 |
|
Debating the Priority and Value of Memory Safety
|
Mar 12, 2024 |
|
Selling Fear, Uncertainty, and Doubt
|
Feb 27, 2024 |
|
Prioritizing AppSec: A Conversation Between a VP of Eng, a Product Manager, and a Security "Pro"
|
Feb 20, 2024 |
|
Villainy, Open Source, and the Software Supply Chain
|
Feb 13, 2024 |
|
Adam Shostack -- Thinking like an Attacker and Risk Management in the Capabilities
|
Feb 06, 2024 |
|
Bug Bounty Theater and Responsible Bug Bounty
|
Jan 30, 2024 |
|
Threat Modeling Capabilities
|
Jan 23, 2024 |
|
Open Source Puppies and Beer
|
Jan 16, 2024 |
|
AppSec Resolutions
|
Jan 09, 2024 |
|
The Impact of Prompt Injection and HackAPrompt_AI in the Age of Security
|
Dec 19, 2023 |
|
Looking Back, Looking Forward
|
Nov 29, 2023 |
|
CVSS 4.0 Unleashed with Patrick Garrity
|
Nov 21, 2023 |
|
An SBOM Lifecycle
|
Nov 14, 2023 |
|
An SBOM Fable
|
Nov 08, 2023 |
|
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
|
Oct 24, 2023 |
|
The Future Role of Security and Shifting off the Table
|
Oct 17, 2023 |
|
A Show About Nothing that Turned into Something
|
Oct 10, 2023 |
|
The Hamster Wheel of Scan and Fix
|
Sep 26, 2023 |
|
Threat Modeling Conference
|
Sep 19, 2023 |
|
AppSec vs. ProdSec
|
Sep 12, 2023 |
|
Imposter Syndrome
|
Sep 05, 2023 |
|
The Return on Investment of Threat Modeling
|
Aug 29, 2023 |
|
Jim Manico ❤️ Threat Modeling: The Untold Story
|
Aug 22, 2023 |
|
Secure by Design
|
Aug 15, 2023 |
|
Security Champions as the Answer to Engineering Hating Security
|
Aug 01, 2023 |
|
Why Do Engineers Hate Security?
|
Jul 26, 2023 |
|
Security Posture is a Thing
|
Jul 18, 2023 |
|
Should #AppSec be Part of the Development Team?
|
Jul 10, 2023 |
|
Lack of Reasonable, or Everything That Is Wrong with Security Requirements
|
Jun 29, 2023 |
|
We Don't Know What We Don't Know
|
Jun 20, 2023 |
|
Privacy and the creepiness factor of collecting data
|
Jun 12, 2023 |
|
Security Guardrails and Paved Roads
|
Jun 05, 2023 |
|
Capture the Flag or NOT?
|
May 27, 2023 |
|
Simple Product Security Requirements
|
May 19, 2023 |
|
Reasonable Software Security: Do We Really Need DAST?
|
May 04, 2023 |
|
The Final Take on the National Cybersecurity Strategy: Software Liability And Privacy
|
Apr 27, 2023 |
|
A Convergence of AI in the World of Cybersecurity
|
Apr 03, 2023 |
|
The US National Cybersecurity Strategy -- Pillars One and Two
|
Mar 20, 2023 |
|
The US National Cybersecurity Strategy - Introduction - Part One
|
Mar 13, 2023 |
|
Application Security, Product Security, and what do we call this thing we do
|
Mar 05, 2023 |
|
Acronyms, Abbreviations, and a slide into Application Security
|
Feb 27, 2023 |
|
Security talent conclusion, from the candidates viewpoint
|
Feb 14, 2023 |
|
Security talent shortage — fact or fiction
|
Feb 07, 2023 |
|
Lastpass and the Security of Security Products
|
Jan 14, 2023 |
|
Software bill of materials -- what is it good for?
|
Jan 02, 2023 |
|
Should security give up on developers?
|
Dec 16, 2022 |
|
Security tools and the companies that make them
|
Dec 11, 2022 |