POPULARITY
Buckle up for another wild ride with Kanye West!
Buckle up for another wild ride with Kanye West!
In this exclusive interview, Dr. Abasi Ene-Obong shares his journey from his love for science to founding 54gene, a company that set out to revolutionize Africa's genomics industry. He opens up about the company's mission, key milestones, impact during COVID-19, and the shocking truth behind the hostile takeover that led to its downfall. Now, he's building again with Syndicate Bio. This is a founder's story of grit, resilience,, and lessons every entrepreneur should know.
Join Amon, Kels and Abasi for a gripping new episode of "The Corner Convo Podcast" as we unravel the shocking story behind Lil Durk's arrest and dive into a world of hip-hop culture, justice, and Chicago's vibrant scene. This lively episode delivers candid conversation and engaging discussions with Sanicole, a visionary filmmaker from Chicago, who shares insights into the challenges and triumphs of crafting stories from the South Side. We also dive deep into the Lakers' secret agenda with Bronny James!
Join Amon, Kels and Abasi for a gripping new episode of "The Corner Convo Podcast" as we unravel the shocking story behind Lil Durk's arrest and dive into a world of hip-hop culture, justice, and Chicago's vibrant scene. This lively episode delivers candid conversation and engaging discussions with Sanicole, a visionary filmmaker from Chicago, who shares insights into the challenges and triumphs of crafting stories from the South Side. We also dive deep into the Lakers' secret agenda with Bronny James!
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301
Join Amon, Kels and Abasi for a lively episode of The Corner Convo Podcast as we dive into the legacy of Caleb Williams joining USC legends. But what about Reggie Bush? We're talking all things college football glory and the politics of jersey retirements. This candid conversation doesn't stop there; we tackle hot topics from the streets of Chicago to the controversial takes on single motherhood. It's a must-listen episode packed with engaging discussions and some real talk about culture, race, and justice. Stay connected with us for a wild ride through these hot topics. Don't forget to like, comment, and SUBSCRIBE to keep up with our weekly dose of edutainment. Thanks for LISTENING! CHAPTERS: 00:00 - Intro 05:30 - Bucket Boys Controversy 12:45 - Candace Owens on Single Mothers 26:20 - USC Retires Reggie Bush's Number 35:44 - Katy Perry's Love Language Explained 41:10 - Transactional Sex Analysis 47:00 - Batman Adam West's Colorado Ban 50:22 - Orgy Participation Inquiry 59:20 - New Music Releases 1:11:56 - Cotton Picking Controversy
Join Amon, Kels and Abasi for a lively episode of The Corner Convo Podcast as we dive into the legacy of Caleb Williams joining USC legends. But what about Reggie Bush? We're talking all things college football glory and the politics of jersey retirements. This candid conversation doesn't stop there; we tackle hot topics from the streets of Chicago to the controversial takes on single motherhood. It's a must-listen episode packed with engaging discussions and some real talk about culture, race, and justice. Stay connected with us for a wild ride through these hot topics. Don't forget to like, comment, and SUBSCRIBE to keep up with our weekly dose of edutainment. Thanks for LISTENING! CHAPTERS: 00:00 - Intro 05:30 - Bucket Boys Controversy 12:45 - Candace Owens on Single Mothers 26:20 - USC Retires Reggie Bush's Number 35:44 - Katy Perry's Love Language Explained 41:10 - Transactional Sex Analysis 47:00 - Batman Adam West's Colorado Ban 50:22 - Orgy Participation Inquiry 59:20 - New Music Releases 1:11:56 - Cotton Picking Controversy
Join Amon, Kels and Abasi for an explosive episode of The Corner Convo Podcast!
Join Amon, Kels and Abasi for an explosive episode of The Corner Convo Podcast!
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-fulfill-your-autonomous-soc-hopes-or-even-your-demo-dreams/ https://www.forrester.com/blogs/top-5-things-you-need-to-know-about-how-generative-ai-is-used-in-security-tools/ https://www.forrester.com/blogs/the-blob-is-poisoning-the-security-industry/ SAPwned demonstrates tenets of tenant isolation, a weak login flow puts Squarespace domains at risk, how AIs might (or might not) be useful for fixing code, getting buy-in for infosec investments, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-292
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-fulfill-your-autonomous-soc-hopes-or-even-your-demo-dreams/ https://www.forrester.com/blogs/top-5-things-you-need-to-know-about-how-generative-ai-is-used-in-security-tools/ https://www.forrester.com/blogs/the-blob-is-poisoning-the-security-industry/ Show Notes: https://securityweekly.com/asw-292
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-fulfill-your-autonomous-soc-hopes-or-even-your-demo-dreams/ https://www.forrester.com/blogs/top-5-things-you-need-to-know-about-how-generative-ai-is-used-in-security-tools/ https://www.forrester.com/blogs/the-blob-is-poisoning-the-security-industry/ SAPwned demonstrates tenets of tenant isolation, a weak login flow puts Squarespace domains at risk, how AIs might (or might not) be useful for fixing code, getting buy-in for infosec investments, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-292
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-fulfill-your-autonomous-soc-hopes-or-even-your-demo-dreams/ https://www.forrester.com/blogs/top-5-things-you-need-to-know-about-how-generative-ai-is-used-in-security-tools/ https://www.forrester.com/blogs/the-blob-is-poisoning-the-security-industry/ Show Notes: https://securityweekly.com/asw-292
Join Amon, Kels and Abasi as they dive into a lively episode of The Corner Convo Podcast! In this must-listen episode, we tackle the BET's Usher Tribute: Major FAIL or Hidden GEM? Our candid conversation covers everything from Stephen A. Smith's controversial comments on BET supporting OJ Simpson to Rick Ross's beef in Canada. Plus, we delve into the heated R. Kelly versus Michael Jackson debate. This engaging discussion doesn't hold back, covering the biggest stories and the hottest takes in Black culture and hip-hop. We also give you the weekend rundown, including Chicago's Full Fest highlights and the pride of Southside. Don't miss out on this episode filled with raw opinions, humor, and straight-up facts. Stay connected with us for more exciting content every week. Don't forget to like, comment, and SUBSCRIBE to our channel for more engaging discussions! Thanks for listening! CHAPTERS: 00:00 - Show Intro 02:00 - Full Fest 04:55 - Chicago News Weekly 05:07 - South Side Pride 11:22 - Angel Reese 15:38 - More Hate from Obsessive 16:16 - Man Robs Person Using Translator App 23:50 - Kendrick Lamar's New Video 28:15 - Rick Ross's Security 33:57 - Usher's Tribute at BET 41:21 - Stephen A Smith Comments on BET 47:40 - R. Kelly vs Michael Jackson 57:27 - NBA vet Stephen Hunter's Rant on LeBron James and Rich Paul 1:01:10 - Everything is Negotiable 1:03:18 - Rooney Rule for the NBA 1:04:53 - Sign Off
Join Amon, Kels and Abasi as they dive into a lively episode of The Corner Convo Podcast! In this must-listen episode, we tackle the BET's Usher Tribute: Major FAIL or Hidden GEM? Our candid conversation covers everything from Stephen A. Smith's controversial comments on BET supporting OJ Simpson to Rick Ross's beef in Canada. Plus, we delve into the heated R. Kelly versus Michael Jackson debate. This engaging discussion doesn't hold back, covering the biggest stories and the hottest takes in Black culture and hip-hop. We also give you the weekend rundown, including Chicago's Full Fest highlights and the pride of Southside. Don't miss out on this episode filled with raw opinions, humor, and straight-up facts. Stay connected with us for more exciting content every week. Don't forget to like, comment, and SUBSCRIBE to our channel for more engaging discussions! Thanks for listening! CHAPTERS: 00:00 - Show Intro 02:00 - Full Fest 04:55 - Chicago News Weekly 05:07 - South Side Pride 11:22 - Angel Reese 15:38 - More Hate from Obsessive 16:16 - Man Robs Person Using Translator App 23:50 - Kendrick Lamar's New Video 28:15 - Rick Ross's Security 33:57 - Usher's Tribute at BET 41:21 - Stephen A Smith Comments on BET 47:40 - R. Kelly vs Michael Jackson 57:27 - NBA vet Stephen Hunter's Rant on LeBron James and Rich Paul 1:01:10 - Everything is Negotiable 1:03:18 - Rooney Rule for the NBA 1:04:53 - Sign Off
Join us in this fiery episode as we dive deep into the buzz surrounding Bronny James' drafting to the Lakers! Is it nepotism or pure talent?
Join us in this fiery episode as we dive deep into the buzz surrounding Bronny James' drafting to the Lakers! Is it nepotism or pure talent?
Understand more about the Blood of Jesus and the power it bestows on Believers in Christ.This minstration was taken by Pastor Uko-Abasi at the RCCG Central Parish Abuja, Nigeria.Listen to more sermons on www.centralparishradio.org and send enquiries to info@centralparishradio.orgGod bless you.Don't Forget to subscribe to our Podcast to receive notifications of new uploads that will bless you greatly.Follow us on our Social Media Handles for details and more; we are on Facebook, Instagram and X (formerly known as Twitter) @centralparishradio
Join us in this lively episode of The Corner Convo Podcast as we dive into the buzzworthy topics that have everyone talking!
Join us in this lively episode of The Corner Convo Podcast as we dive into the buzzworthy topics that have everyone talking!
Sermon by Pastor Uko-Abasi on Maximising the Harvest.Listen to more messages from RCCG Central Parish on www.centralparishradio.org and Central Parish Radio's App.Don't Forget to subscribe to our Podcast to receive notifications of new uploads that will bless you greatly.Follow us on our Social Media Handles for details and more; we are on Facebook, Instagram and X (formerly known as Twitter) @centralparishradio
Join Amon and Abasi as we uncover the hidden gems of Chicago's music scene in this lively episode!
Join Amon and Abasi as we uncover the hidden gems of Chicago's music scene in this lively episode!
Join Amon, Kels and Abasi for a lively episode of The Corner Convo Podcast! This week, we dive into the explosive Shaq vs. Shannon Sharpe feud that has the sports world buzzing!
Join Amon, Kels and Abasi for a lively episode of The Corner Convo Podcast! This week, we dive into the explosive Shaq vs. Shannon Sharpe feud that has the sports world buzzing!
We look into the supply chain saga of the XZ Utils backdoor. It's a wild story of a carefully planned long con to add malicious code to a commonly used package that many SSH connections rely on. It hits themes from social engineering and abuse of trust to obscuring the changes and suppressing warnings. It also has a few lessons about software development, the social and economic dynamics of open source, and strategies for patching software. It's an exciting topic partially because so much other appsec is boring. And that boring stuff is important to get right first. We also talk about what parts of this that orgs should be worried about and what types of threats they should be prioritizing instead. Segment Resources: https://tukaani.org/xz-backdoor/ https://news.risky.biz/risky-biz-news-supply-chain-attack-in-linuxland/ https://www.zdnet.com/article/this-backdoor-almost-infected-linux-everywhere-the-xz-utils-close-call/#ftag=RSSbaffb68 https://therecord.media/malicious-backdoor-code-linux-red-hat-cisa https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 https://duo.com/decipher/carefully-crafted-campaign-led-to-xz-utils-backdoor https://boehs.org/node/everything-i-know-about-the-xz-backdoor OWASP leaks resumes, defining different types of prompt injection, a secure design example in device-bound sessions, turning an ASVS requirement into practice, Ivanti has its 2000s-era Microsoft moment, HTTP/2 CONTINUATION flood, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-280
We look into the supply chain saga of the XZ Utils backdoor. It's a wild story of a carefully planned long con to add malicious code to a commonly used package that many SSH connections rely on. It hits themes from social engineering and abuse of trust to obscuring the changes and suppressing warnings. It also has a few lessons about software development, the social and economic dynamics of open source, and strategies for patching software. It's an exciting topic partially because so much other appsec is boring. And that boring stuff is important to get right first. We also talk about what parts of this that orgs should be worried about and what types of threats they should be prioritizing instead. Segment Resources: https://tukaani.org/xz-backdoor/ https://news.risky.biz/risky-biz-news-supply-chain-attack-in-linuxland/ https://www.zdnet.com/article/this-backdoor-almost-infected-linux-everywhere-the-xz-utils-close-call/#ftag=RSSbaffb68 https://therecord.media/malicious-backdoor-code-linux-red-hat-cisa https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 https://duo.com/decipher/carefully-crafted-campaign-led-to-xz-utils-backdoor https://boehs.org/node/everything-i-know-about-the-xz-backdoor Show Notes: https://securityweekly.com/asw-280
We look into the supply chain saga of the XZ Utils backdoor. It's a wild story of a carefully planned long con to add malicious code to a commonly used package that many SSH connections rely on. It hits themes from social engineering and abuse of trust to obscuring the changes and suppressing warnings. It also has a few lessons about software development, the social and economic dynamics of open source, and strategies for patching software. It's an exciting topic partially because so much other appsec is boring. And that boring stuff is important to get right first. We also talk about what parts of this that orgs should be worried about and what types of threats they should be prioritizing instead. Segment Resources: https://tukaani.org/xz-backdoor/ https://news.risky.biz/risky-biz-news-supply-chain-attack-in-linuxland/ https://www.zdnet.com/article/this-backdoor-almost-infected-linux-everywhere-the-xz-utils-close-call/#ftag=RSSbaffb68 https://therecord.media/malicious-backdoor-code-linux-red-hat-cisa https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 https://duo.com/decipher/carefully-crafted-campaign-led-to-xz-utils-backdoor https://boehs.org/node/everything-i-know-about-the-xz-backdoor OWASP leaks resumes, defining different types of prompt injection, a secure design example in device-bound sessions, turning an ASVS requirement into practice, Ivanti has its 2000s-era Microsoft moment, HTTP/2 CONTINUATION flood, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-280
We look into the supply chain saga of the XZ Utils backdoor. It's a wild story of a carefully planned long con to add malicious code to a commonly used package that many SSH connections rely on. It hits themes from social engineering and abuse of trust to obscuring the changes and suppressing warnings. It also has a few lessons about software development, the social and economic dynamics of open source, and strategies for patching software. It's an exciting topic partially because so much other appsec is boring. And that boring stuff is important to get right first. We also talk about what parts of this that orgs should be worried about and what types of threats they should be prioritizing instead. Segment Resources: https://tukaani.org/xz-backdoor/ https://news.risky.biz/risky-biz-news-supply-chain-attack-in-linuxland/ https://www.zdnet.com/article/this-backdoor-almost-infected-linux-everywhere-the-xz-utils-close-call/#ftag=RSSbaffb68 https://therecord.media/malicious-backdoor-code-linux-red-hat-cisa https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 https://duo.com/decipher/carefully-crafted-campaign-led-to-xz-utils-backdoor https://boehs.org/node/everything-i-know-about-the-xz-backdoor Show Notes: https://securityweekly.com/asw-280
Farshad Abasi joins us again to talk about creating a new OWASP project, the Secure Pipeline Verification Standard. (Bonus points for not being a top ten list!) We talk about what it takes to pitch a new project and the problems that this new project is trying to solve. For this kind of project to be successful -- as in making a positive impact to how software is built -- it's important to not only identify the right audience, but craft guidance in a way that's understandable and achievable for that audience. This is also a chance to learn more about a project in its early days and the opportunities for participating in its development! Segment resources https://github.com/OWASP/www-project-secure-pipeline-verification-standard--spvs- (coming soon!) PrintListener recreates fingerprints, iMessage updates key handling for a PQ3 rating, Silent Sabotage shows supply chain subterfuge against AI models, 2023 Rust survey results, the ways genAI might help developers, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-274
Farshad Abasi joins us again to talk about creating a new OWASP project, the Secure Pipeline Verification Standard. (Bonus points for not being a top ten list!) We talk about what it takes to pitch a new project and the problems that this new project is trying to solve. For this kind of project to be successful -- as in making a positive impact to how software is built -- it's important to not only identify the right audience, but craft guidance in a way that's understandable and achievable for that audience. This is also a chance to learn more about a project in its early days and the opportunities for participating in its development! Segment resources https://github.com/OWASP/www-project-secure-pipeline-verification-standard--spvs- (coming soon!) Show Notes: https://securityweekly.com/asw-274
Farshad Abasi joins us again to talk about creating a new OWASP project, the Secure Pipeline Verification Standard. (Bonus points for not being a top ten list!) We talk about what it takes to pitch a new project and the problems that this new project is trying to solve. For this kind of project to be successful -- as in making a positive impact to how software is built -- it's important to not only identify the right audience, but craft guidance in a way that's understandable and achievable for that audience. This is also a chance to learn more about a project in its early days and the opportunities for participating in its development! Segment resources https://github.com/OWASP/www-project-secure-pipeline-verification-standard--spvs- (coming soon!) PrintListener recreates fingerprints, iMessage updates key handling for a PQ3 rating, Silent Sabotage shows supply chain subterfuge against AI models, 2023 Rust survey results, the ways genAI might help developers, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-274
Farshad Abasi joins us again to talk about creating a new OWASP project, the Secure Pipeline Verification Standard. (Bonus points for not being a top ten list!) We talk about what it takes to pitch a new project and the problems that this new project is trying to solve. For this kind of project to be successful -- as in making a positive impact to how software is built -- it's important to not only identify the right audience, but craft guidance in a way that's understandable and achievable for that audience. This is also a chance to learn more about a project in its early days and the opportunities for participating in its development! Segment resources https://github.com/OWASP/www-project-secure-pipeline-verification-standard--spvs- (coming soon!) Show Notes: https://securityweekly.com/asw-274
Edo-Abasi McGee, PharmD, BCPS, joins PPN founder and CEO, Todd Eury, to discuss ways to reduce vaccine hesitancy, specifically in communities of color, and how to navigate a world in which the COVID-19 pandemic is now endemic. Dr. McGee reviews a paper she and her colleagues published, which provides guidance on how to help control public messaging to reduce vaccine hesitancy and promote vaccine equity. Dr. McGee is an associate professor at the Philadelphia College of Osteopathic Medicine School of Pharmacy. Her practice and research interests include antimicrobial stewardship, antimicrobial allergies, antimicrobial resistance, antimicrobial pharmacokinetics and pharmacodynamics, and active learning and teaching. Host, Todd Eury Guest, Edo-Abasi McGee, PharmD, BCPS
PART 2! Arguably the most important thing in Metal...GUITARS, and the badasses that play them! We get it, Vocals are important too, but you can scream or growl all you want...if it doesn't have guitars, it's not Metal - Windstein, Cantrell, Dimebag, Borland, Duplantier, Head & Munky, Abasi, Petrucci, Gallagher, Suicmez, Morello, Ihsahn, Townsend, Adam D, Susi, Buzz, Donais, Fox, Morgan, Morton, Adler, Knight, Owen, Hobbs, Eschbach, Xenopolous, Harhoff, Kummerer, Flynn, Cavalera, Loomis, Amott, Cazares, Thordendal..and SO many more - We're talking about our favorites from (what we call) the Modern Era - after 1993 (totally arbitrary year), and we wanna hear from you as well...let us know your favorites at: https://linktr.ee/MetalListPodcast - Theme Song by Godhammered at: https://linktr.ee/Godhammered
From devoted follower of Muhammad to persecuted follower of Jesus.-Also, the story of Soon Ok Lee and what she saw in prison...
Farshad Abasi shares three models for deploying resources within application security teams:The Dedicated AppSec Person Model involves assigning an AppSec person to work with each team. Farshad shares his experience of working with developers and the challenges faced in getting them to understand and implement threat modeling. He also discusses the transition from waterfall to Agile and how it affected threat modeling.The Federated Model: A security consultant attends weekly standups and sprint planning sessions in this model. They work with a checklist to quickly determine if any user stories could be security sensitive. This model reduces the allocation required to 10 to 20% of an AppSec consultant.The Champion or Deputy Model: The AppSec team deputizes developers to do the bulk of the application security work, and the AppSec team becomes a resource and escalation point for more complex problems. Each DevOps team appoints a security champion, and these champions form a working group supported by an AppSec person. The champions handle day-to-day issues and threat modeling, with the AppSec team providing mentorship and support.Over several years, Farshad's journey progressed from the expert-led model to a fully-deputized, champion-driven approach to AppSec. After careful consideration, we conclude that the fully deputized model is the only path to scalability.FOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast➜LinkedIn: The Application Security Podcast➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast Thanks for Listening! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Check out this interview from the ASW VAULT, hand picked by main host Mike Shema! This segment was originally published on March 14, 2022. Cybersecurity is a large and often complex domain, traditionally focused on the infrastructure and general information security, with little or no attention to Application Security. Security providers usually tack-on AppSec services to their existing menu of offering without understanding the domain, and their team of professionals have little or no experience with software development or inner workings of modern application architectures. As the world turns Digital at a rapid pace accelerated by the recent pandemic, applications become common place in our lives, providing attackers more opportunities to exploit these poorly protected applications. As such, it is important to know what is actually required to build and run software securely, and how to do application security right. Segment Resources: https://forwardsecurity.com/2022/03/07/application-security-for-busy-tech-execs/ Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/vault-asw-1
Check out this interview from the ASW VAULT, hand picked by main host Mike Shema! This segment was originally published on March 14, 2022. Cybersecurity is a large and often complex domain, traditionally focused on the infrastructure and general information security, with little or no attention to Application Security. Security providers usually tack-on AppSec services to their existing menu of offering without understanding the domain, and their team of professionals have little or no experience with software development or inner workings of modern application architectures. As the world turns Digital at a rapid pace accelerated by the recent pandemic, applications become common place in our lives, providing attackers more opportunities to exploit these poorly protected applications. As such, it is important to know what is actually required to build and run software securely, and how to do application security right. Segment Resources: https://forwardsecurity.com/2022/03/07/application-security-for-busy-tech-execs/ Show notes: https://www.scmagazine.com/podcast-episode/asw-188-farshad-abasi
Check out this interview from the ASW VAULT, hand picked by main host Mike Shema! This segment was originally published on March 14, 2022. Cybersecurity is a large and often complex domain, traditionally focused on the infrastructure and general information security, with little or no attention to Application Security. Security providers usually tack-on AppSec services to their existing menu of offering without understanding the domain, and their team of professionals have little or no experience with software development or inner workings of modern application architectures. As the world turns Digital at a rapid pace accelerated by the recent pandemic, applications become common place in our lives, providing attackers more opportunities to exploit these poorly protected applications. As such, it is important to know what is actually required to build and run software securely, and how to do application security right. Segment Resources: https://forwardsecurity.com/2022/03/07/application-security-for-busy-tech-execs/ Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/vault-asw-1
Check out this interview from the ASW VAULT, hand picked by main host Mike Shema! This segment was originally published on March 14, 2022. Cybersecurity is a large and often complex domain, traditionally focused on the infrastructure and general information security, with little or no attention to Application Security. Security providers usually tack-on AppSec services to their existing menu of offering without understanding the domain, and their team of professionals have little or no experience with software development or inner workings of modern application architectures. As the world turns Digital at a rapid pace accelerated by the recent pandemic, applications become common place in our lives, providing attackers more opportunities to exploit these poorly protected applications. As such, it is important to know what is actually required to build and run software securely, and how to do application security right. Segment Resources: https://forwardsecurity.com/2022/03/07/application-security-for-busy-tech-execs/ Show notes: https://www.scmagazine.com/podcast-episode/asw-188-farshad-abasi
“I felt like I had no control, not knowing what's going on in my life, but I kept fighting, and no one felt anything - in fact, the company doubled itself.” He felt great responsibility to succeed for his family at home, and for his family of employees in HAAT - his community. Part of the capacity of responsibility that you choose to take on yourself when you become a founder is exactly this; accepting that even in the most stressful, difficult, and challenging moments, you will still be there, because you see it's serving something bigger than yourself. “Generally speaking, the journey is super difficult. We usually see the success, but we don't see the suffering and patience behind it. Physically, I'm really tired, but mentally, I'm super excited. It's the happiest and the hardest time in my life at the same time.” Diving into everything in episode 102 of The Human Founder podcast, with Hasan Abasi, CEO at HAAT Delivery.
This week in the AppSec News: Apple introduces Lockdown Mode, PyPI hits 2FA trouble, cataloging cloud vulns, practical attacks on ML, NIST's post-quantum algorithms, & more! Appsec starts with the premise that we need to build secure code, but it also has to be able to recommend effective practices and tools that help developers. This also means appsec teams need to work with developers to create criteria for security solutions, whether it's training or scanners, in order to make sure their investments of time and money lead to more secure apps. Segment Resources: https://forwardsecurity.com/2022/04/24/embedding-security-into-software-during-development/ https://forwardsecurity.com/2022/03/15/application-security-for-busy-tech-execs/ https://forwardsecurity.com/2022/03/09/sast-sca-dast-iast-rasp-what-they-are-and-how-you-can-automate-application-security/ Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/secweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/asw203
This week in the AppSec News: Apple introduces Lockdown Mode, PyPI hits 2FA trouble, cataloging cloud vulns, practical attacks on ML, NIST's post-quantum algorithms, & more! Appsec starts with the premise that we need to build secure code, but it also has to be able to recommend effective practices and tools that help developers. This also means appsec teams need to work with developers to create criteria for security solutions, whether it's training or scanners, in order to make sure their investments of time and money lead to more secure apps. Segment Resources: https://forwardsecurity.com/2022/04/24/embedding-security-into-software-during-development/ https://forwardsecurity.com/2022/03/15/application-security-for-busy-tech-execs/ https://forwardsecurity.com/2022/03/09/sast-sca-dast-iast-rasp-what-they-are-and-how-you-can-automate-application-security/ Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/secweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/asw203
Appsec starts with the premise that we need to build secure code, but it also has to be able to recommend effective practices and tools that help developers. This also means appsec teams need to work with developers to create criteria for security solutions, whether it's training or scanners, in order to make sure their investments of time and money lead to more secure apps. Segment Resources: https://forwardsecurity.com/2022/04/24/embedding-security-into-software-during-development/ https://forwardsecurity.com/2022/03/15/application-security-for-busy-tech-execs/ https://forwardsecurity.com/2022/03/09/sast-sca-dast-iast-rasp-what-they-are-and-how-you-can-automate-application-security/ Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw203
"Old-fashioned spine surgery is dead—it just hasn't been told yet." That's a bold statement, but if anyone's qualified to make it, it's Dr. Hamid Abassi. He's chief medical officer at Inspired Spine, a board-certified neurosurgeon, and an internationally recognized expert in minimally invasive spinal surgery. Dr. Abasi is also one of the most experienced surgeons to perform the OBL lateral lumbar inner body fusion procedure, and the only surgeon currently performing minimally invasive thoracic inner body fusion. Join us as he explains how modern medicine's tendency to “play it safe” can sometimes harm (or at least severely limit) patients, and what it will take for “game-changing” procedures to supplant outdated ones. In this episode, you'll learn: Stats proving Dr. Abassi's claim that “having a spine problem is part of being human” Why Dr. Abassi likens the discs in our spines to tires on a car Lessons from one of Dr. Abassi's hero, Nobel Prize-winner Barry Marshall The type of red tape that's most restrictive to innovative surgeons in 2022 Plus, we explore MedTech's role in spine's patient-driven revolution Resources from this episode: Download the Behavior Change Blueprint Visit inspiredspine.com Social Media: Connect with Dr. Abassi on LinkedIn Connect with Zed on LinkedIn Connect with Clark on LinkedIn
Cybersecurity is a large and often complex domain, traditionally focused on the infrastructure and general information security, with little or no attention to Application Security. Security providers usually tack-on AppSec services to their existing menu of offering without understanding the domain, and their team of professionals have little or no experience with software development or inner workings of modern application architectures. As the world turns Digital at a rapid pace accelerated by the recent pandemic, applications become common place in our lives, providing attackers more opportunities to exploit these poorly protected applications. As such, it is important to know what is actually required to build and run software securely, and how to do application security right. This week in the AppSec News: Dirty Pipe vuln hits the Linux Kernel, AutoWarp vuln hits Azure Automation, TLStorm hits critical infrastructure, & hacking the Mazda RX8 ECU! Show Notes: https://securityweekly.com/asw188 Segment Resources: https://forwardsecurity.com/2022/03/07/application-security-for-busy-tech-execs/ Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Cybersecurity is a large and often complex domain, traditionally focused on the infrastructure and general information security, with little or no attention to Application Security. Security providers usually tack-on AppSec services to their existing menu of offering without understanding the domain, and their team of professionals have little or no experience with software development or inner workings of modern application architectures. As the world turns Digital at a rapid pace accelerated by the recent pandemic, applications become common place in our lives, providing attackers more opportunities to exploit these poorly protected applications. As such, it is important to know what is actually required to build and run software securely, and how to do application security right. Segment Resources: https://forwardsecurity.com/2022/03/07/application-security-for-busy-tech-execs/ Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw188