The Elephant in AppSec

By The Elephant in AppSec

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast
    

Subscribers: 1
Reviews: 0
Episodes: 63

Description

Time to discuss AppSec issues no one talks about.

Episode Date
Are Traditional WAFs Dead? The Impact of OpenAPI Specs on Web Security with Nathan Byrd
Jun 06, 2025
Finding AppSec tools that developers love — is it possible? with Linda Fay
May 30, 2025
What Most Security Teams Miss: An Engineering Manager’s Take on AppSec with Desmond Lamptey
May 27, 2025
Compliance in Cyber: Can Regulation and Innovation coexist?⎜Chris Hughes
May 23, 2025
The Future of Product Security: Quality Engineering or something more? with Michael Novack
May 16, 2025
Should We Fix All Bad Code? with Eitan Worcel
May 09, 2025
AI, Speed, and Startup Chaos: Is ‘Minimum Viable Security’ the Fix? ⎜ Kalyani Pawar
May 02, 2025
Security IDE Plugins: Can They Really Boost Your Coding Security? ⎜Jamie Scott
Apr 18, 2025
DAST Tools: Can We Change the AppSec Community Perception? with Chris Lindsey
Apr 09, 2025
Secure Coding — Can we make it happen? with Tanya Janca
Apr 03, 2025
How Psychology Really Shapes AppSec Wins & Fails ⎢ Curtis Koenig
Mar 28, 2025
The Open Source Security Crisis: Is Trust the Weakest Link in Supply Chain? with François Proulx
Mar 19, 2025
Are we truly managing Third-Party risks, or just playing security theater? ⎢Rachel Curran
Mar 14, 2025
Hyped or Helpful? The Truth About Reachability & Developer Buy-In ⎢ Nir Valtman
Mar 06, 2025
DevSecOps vs. Reality: What You REALLY Need to Succeed!
Feb 28, 2025
Unpacking Opengrep—A Deep Dive with Its Backing Teams
Feb 19, 2025
Is There a Secret to Mastering Threat Modeling at Scale? Ashwini Siddhi (GoDaddy)
Feb 14, 2025
Can You Really Quantify AppSec ROI? Here’s the Truth! ⎜Irfaan Santoe
Feb 03, 2025
How to Fix API Security Before It’s Too Late ⎜ Confidence Staveley
Jan 28, 2025
The Untold Benefits of Continuous Threat Modeling You Didn’t Know About ⎜Izar Tarandach
Jan 20, 2025
What does “collaborate with engineering” actually mean in AppSec? ⎜Koen Hendrix (Zendesk)
Jan 15, 2025
Is your organization mature enough for its first AppSec hire?⎢Akira Brand
Dec 24, 2024
Are we overlooking Kubernetes security in the race to deploy applications - Raunaq Arora
Dec 19, 2024
Is it actually realistic to see everyone as the greatest ally in security? - Alina Yakubenko
Dec 16, 2024
Can DevSecOps Maturity Models Fail? The Hidden Gaps in AppSec Programs ⎜Timo Pagel
Dec 11, 2024
Risk, Product Management, and Supply Chain Security: Is There a Connection? ⎜Jesus Cuadrado
Dec 04, 2024
How hard is it to make DevSecOps work in a Hybrid Cloud? ⎜Michael Tayo
Dec 02, 2024
Is It Possible to Maximize the Effectiveness of Security Champions? ⎜ Magdalena Modric
Nov 25, 2024
Hacker Turned Policy Builder: What They Don’t Want You to Know
Nov 15, 2024
Why Is Transforming Company Culture for Product Security So Challenging? ⎜ Ariel Shin
Oct 30, 2024
The API Governance Problem: Why Your API Security Is at Risk (And How to Fix It) ⎜Akansha Shukla
Oct 23, 2024
AI Chatbots: Security Disaster or Can We Build Them Securely? ⎜Ante Gojsalic & Benjamin Dulieu
Oct 15, 2024
Open Source vs. Commercial Software: The Ultimate Showdown⎜Kyle Kelly
Oct 10, 2024
Privacy vs. Application Security: Can They Truly Coexist? | Kim Wuyts
Oct 01, 2024
From PhD to AppSec: How to Bridge the Gap Between Research & Security Tools | Diego Sempreboni
Sep 24, 2024
AppSec for Startups: Critical or Overlooked? | Rob Picard
Sep 20, 2024
What are the risks associated with open source? | Kaiwen Jiang
Sep 12, 2024
Season 2 The Elephant in AppSec Podcast Trailer
Sep 06, 2024
AI Security - How hard is it to develop secure AI? ⎪Rob van der Veer
Jul 07, 2024
We Don’t Let the Bad Guys Win: Is It Possible with All Third-Party Apps in Oil & Gas? ⎜Catharina "DD" Budiharto
Jun 20, 2024
Why “shift-left” isn’t good enough ⎪Chris Romeo
Jun 07, 2024
What are the Non-Human Identity challenges? ⎪Andrew Wilder and Amir Shaked
May 23, 2024
API Security: Are Vendors Just Blowing Smoke? ⎪David Homoney
May 21, 2024
The Truth About Software Supply Chain Risks ⎪Cassie Crossley
May 10, 2024
How secure are your digital wallets? ⎪Max Imbiel (Bitpanda)
Apr 29, 2024
How security research can earn you $20m in tokens ⎪Swan Beaujard
Apr 29, 2024
Securing cloud native applications: how hard is it? ⎪Mihir Shah
Apr 12, 2024
Are custom security tests a product security superpower? ⎜Keshav Malik (LinkedIn)
Apr 01, 2024
The art and science of product security ⎥Jacob Salassi (Snowflake)
Mar 21, 2024
Security Consultant vs. In-House Engineer: The Showdown⎜Ric Campo
Mar 05, 2024
Developers and security training: can they co-exist?⎜Laura Bell Main
Feb 29, 2024
Adversarial machine learning: what is it and are we ready? ⎜Anmol Agarwal
Feb 23, 2024
AppSec vendors and CISOs: a love - hate relationship? ⎜Olivia Rose
Feb 15, 2024
Pentesting: What are the actual benefits?⎥Harsh Modi
Feb 08, 2024
Security champion program: A must or completely useless? ⎥Dustin Lehr
Feb 01, 2024
Is Gen AI your new AppSec weapon?
Jan 26, 2024
Security training: Necessary investment or overrated expense?⎥Mel Reyes
Jan 26, 2024
What is ASPM: A breakdown of the current state and its future
Jan 11, 2024
SCADA systems: How secure are the systems running our infrastructure? ⎥Malav Vyas
Jan 04, 2024
Threat modeling: the future of cybersecurity or another buzzword⎥Derek Fisher
Dec 21, 2023
Security experience: top-down vs bottom-up⎥Jeevan Singh (Rippling, Twilio)
Dec 13, 2023
Lack of effective DAST tools⎥Aleksandr Krasnov (Meta, Thinkific, Dropbox)
Nov 30, 2023
The Elephant in AppSec Podcast Trailer | Escape
Nov 29, 2023