Podcasts about mikeshema

  • 11PODCASTS
  • 170EPISODES
  • 42mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Sep 2, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about mikeshema

Latest podcast episodes about mikeshema

Paul's Security Weekly
Close the Security Theater: Enter Resilience - Kelly Shortridge - ASW Vault

Paul's Security Weekly

Play Episode Listen Later Sep 2, 2024 37:48


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these questions and more. Segment Resources: Book -- https://securitychaoseng.com Blog -- https://kellyshortridge.com/blog/posts/ Show Notes: https://securityweekly.com/vault-asw-13

Paul's Security Weekly TV
Close the Security Theater: Enter Resilience - Kelly Shortridge - ASW Vault

Paul's Security Weekly TV

Play Episode Listen Later Sep 2, 2024 37:48


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these questions and more. Segment Resources: Book -- https://securitychaoseng.com Blog -- https://kellyshortridge.com/blog/posts/ Show Notes: https://securityweekly.com/vault-asw-13

Application Security Weekly (Audio)
Close the Security Theater: Enter Resilience - Kelly Shortridge - ASW Vault

Application Security Weekly (Audio)

Play Episode Listen Later Sep 2, 2024 37:48


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these questions and more. Segment Resources: Book -- https://securitychaoseng.com Blog -- https://kellyshortridge.com/blog/posts/ Show Notes: https://securityweekly.com/vault-asw-13

Application Security Weekly (Video)
Close the Security Theater: Enter Resilience - Kelly Shortridge - ASW Vault

Application Security Weekly (Video)

Play Episode Listen Later Sep 2, 2024 37:48


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these questions and more. Segment Resources: Book -- https://securitychaoseng.com Blog -- https://kellyshortridge.com/blog/posts/ Show Notes: https://securityweekly.com/vault-asw-13

Paul's Security Weekly
Learning EBPF - Liz Rice - ASW Vault

Paul's Security Weekly

Play Episode Listen Later Jun 18, 2024 37:16


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of infrastructure tools for networking, observability, and security. Let's explore eBPF and understand its value for security, and how it's used to secure network connectivity in the Cilium project, and for runtime security observability and enforcement in Cilium's sub-project, Tetragon. Segment Resources: Download "Learning eBPF": https://isovalent.com/learning-ebpf Buy "Learning eBPF" from Amazon: https://www.amazon.com/Learning-eBPF-Programming-Observability-Networking/dp/1098135121 Cilium project: https://cilium.io Tetragon project: https://tetragon.cilium.io/ Show Notes: https://securityweekly.com/vault-asw-11

Paul's Security Weekly TV
Learning EBPF - Liz Rice - ASW Vault

Paul's Security Weekly TV

Play Episode Listen Later Jun 18, 2024 37:16


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of infrastructure tools for networking, observability, and security. Let's explore eBPF and understand its value for security, and how it's used to secure network connectivity in the Cilium project, and for runtime security observability and enforcement in Cilium's sub-project, Tetragon. Segment Resources: Download "Learning eBPF": https://isovalent.com/learning-ebpf Buy "Learning eBPF" from Amazon: https://www.amazon.com/Learning-eBPF-Programming-Observability-Networking/dp/1098135121 Cilium project: https://cilium.io Tetragon project: https://tetragon.cilium.io/ Show Notes: https://securityweekly.com/vault-asw-11

Application Security Weekly (Audio)
Learning EBPF - Liz Rice - ASW Vault

Application Security Weekly (Audio)

Play Episode Listen Later Jun 18, 2024 37:16


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of infrastructure tools for networking, observability, and security. Let's explore eBPF and understand its value for security, and how it's used to secure network connectivity in the Cilium project, and for runtime security observability and enforcement in Cilium's sub-project, Tetragon. Segment Resources: Download "Learning eBPF": https://isovalent.com/learning-ebpf Buy "Learning eBPF" from Amazon: https://www.amazon.com/Learning-eBPF-Programming-Observability-Networking/dp/1098135121 Cilium project: https://cilium.io Tetragon project: https://tetragon.cilium.io/ Show Notes: https://securityweekly.com/vault-asw-11

Application Security Weekly (Video)
Learning EBPF - Liz Rice - ASW Vault

Application Security Weekly (Video)

Play Episode Listen Later Jun 18, 2024 37:16


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of infrastructure tools for networking, observability, and security. Let's explore eBPF and understand its value for security, and how it's used to secure network connectivity in the Cilium project, and for runtime security observability and enforcement in Cilium's sub-project, Tetragon. Segment Resources: Download "Learning eBPF": https://isovalent.com/learning-ebpf Buy "Learning eBPF" from Amazon: https://www.amazon.com/Learning-eBPF-Programming-Observability-Networking/dp/1098135121 Cilium project: https://cilium.io Tetragon project: https://tetragon.cilium.io/ Show Notes: https://securityweekly.com/vault-asw-11

Paul's Security Weekly
Collecting Bounties and Building Communities - Ben Sadeghipour - ASW Vault

Paul's Security Weekly

Play Episode Listen Later May 28, 2024 36:23


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 18, 2023. We talk with Ben about the rewards, hazards, and fun of bug bounty programs. Then we find out different ways to build successful and welcoming communities. Show Notes: https://securityweekly.com/vault-asw-9

Paul's Security Weekly TV
Collecting Bounties and Building Communities - Ben Sadeghipour - ASW Vault

Paul's Security Weekly TV

Play Episode Listen Later May 28, 2024 36:23


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 18, 2023. We talk with Ben about the rewards, hazards, and fun of bug bounty programs. Then we find out different ways to build successful and welcoming communities. Show Notes: https://securityweekly.com/vault-asw-9

Application Security Weekly (Audio)
Collecting Bounties and Building Communities - Ben Sadeghipour - ASW Vault

Application Security Weekly (Audio)

Play Episode Listen Later May 28, 2024 36:23


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 18, 2023. We talk with Ben about the rewards, hazards, and fun of bug bounty programs. Then we find out different ways to build successful and welcoming communities. Show Notes: https://securityweekly.com/vault-asw-9

Application Security Weekly (Video)
Collecting Bounties and Building Communities - Ben Sadeghipour - ASW Vault

Application Security Weekly (Video)

Play Episode Listen Later May 28, 2024 36:23


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 18, 2023. We talk with Ben about the rewards, hazards, and fun of bug bounty programs. Then we find out different ways to build successful and welcoming communities. Show Notes: https://securityweekly.com/vault-asw-9

Paul's Security Weekly
Redefining Threat Modeling - Security Team Goes on Vacation - Jeevan Singh - ASW Vault

Paul's Security Weekly

Play Episode Listen Later Feb 20, 2024 38:29


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on Dec 13, 2022. Threat modeling is an important part of a security program, but as companies grow you will choose which features you want to threat model or become a bottleneck. What if I told you, you can have your cake and eat it too. It is possible to scale your program and deliver higher quality threat models. Segment Resources: - Original blog: https://segment.com/blog/redefining-threat-modeling/ - Open Sourced slides: https://github.com/segmentio/threat-modeling-training Show Notes: https://securityweekly.com/vault-asw-8

Paul's Security Weekly TV
Redefining Threat Modeling - Security Team Goes on Vacation - Jeevan Singh - ASW Vault

Paul's Security Weekly TV

Play Episode Listen Later Feb 20, 2024 38:29


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on Dec 13, 2022. Threat modeling is an important part of a security program, but as companies grow you will choose which features you want to threat model or become a bottleneck. What if I told you, you can have your cake and eat it too. It is possible to scale your program and deliver higher quality threat models. Segment Resources: - Original blog: https://segment.com/blog/redefining-threat-modeling/ - Open Sourced slides: https://github.com/segmentio/threat-modeling-training Show Notes: https://securityweekly.com/vault-asw-8

Application Security Weekly (Audio)
Redefining Threat Modeling - Security Team Goes on Vacation - Jeevan Singh - ASW Vault

Application Security Weekly (Audio)

Play Episode Listen Later Feb 20, 2024 38:29


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on Dec 13, 2022. Threat modeling is an important part of a security program, but as companies grow you will choose which features you want to threat model or become a bottleneck. What if I told you, you can have your cake and eat it too. It is possible to scale your program and deliver higher quality threat models. Segment Resources: - Original blog: https://segment.com/blog/redefining-threat-modeling/ - Open Sourced slides: https://github.com/segmentio/threat-modeling-training Show Notes: https://securityweekly.com/vault-asw-8

Application Security Weekly (Video)
Redefining Threat Modeling - Security Team Goes on Vacation - Jeevan Singh - ASW Vault

Application Security Weekly (Video)

Play Episode Listen Later Feb 20, 2024 38:29


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on Dec 13, 2022. Threat modeling is an important part of a security program, but as companies grow you will choose which features you want to threat model or become a bottleneck. What if I told you, you can have your cake and eat it too. It is possible to scale your program and deliver higher quality threat models. Segment Resources: - Original blog: https://segment.com/blog/redefining-threat-modeling/ - Open Sourced slides: https://github.com/segmentio/threat-modeling-training Show Notes: https://securityweekly.com/vault-asw-8

Paul's Security Weekly
Broadening What We Call AppSec - Christien Rioux - ASW Vault

Paul's Security Weekly

Play Episode Listen Later Sep 5, 2023 35:36


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on January 10, 2022. There's an understandable focus on "shift left" in modern DevOps and appsec discussions. So what does it take to broaden what we call appsec into something effective for modern apps, whether they're on the web, mobile, or cloud? We'll talk about moving on from niche offerings into successful appsec programs. Show Notes: https://securityweekly.com/vault-asw-4 

Paul's Security Weekly TV
Broadening What We Call AppSec - Christien Rioux - ASW Vault

Paul's Security Weekly TV

Play Episode Listen Later Sep 5, 2023 35:36


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on January 10, 2022. There's an understandable focus on "shift left" in modern DevOps and appsec discussions. So what does it take to broaden what we call appsec into something effective for modern apps, whether they're on the web, mobile, or cloud? We'll talk about moving on from niche offerings into successful appsec programs. Show Notes: https://securityweekly.com/vault-asw-4 

Application Security Weekly (Audio)
Broadening What We Call AppSec - Christien Rioux - ASW Vault

Application Security Weekly (Audio)

Play Episode Listen Later Sep 5, 2023 35:36


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on January 10, 2022. There's an understandable focus on "shift left" in modern DevOps and appsec discussions. So what does it take to broaden what we call appsec into something effective for modern apps, whether they're on the web, mobile, or cloud? We'll talk about moving on from niche offerings into successful appsec programs. Show Notes: https://securityweekly.com/vault-asw-4 

Application Security Weekly (Video)
Broadening What We Call AppSec - Christien Rioux - ASW Vault

Application Security Weekly (Video)

Play Episode Listen Later Sep 5, 2023 35:36


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on January 10, 2022. There's an understandable focus on "shift left" in modern DevOps and appsec discussions. So what does it take to broaden what we call appsec into something effective for modern apps, whether they're on the web, mobile, or cloud? We'll talk about moving on from niche offerings into successful appsec programs. Show Notes: https://securityweekly.com/vault-asw-4 

Paul's Security Weekly
The Psychology of Training - Matias Madou - ASW Vault

Paul's Security Weekly

Play Episode Listen Later Jul 5, 2023 35:01


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 23, 2022. Developers want bug-free code -- it frees up their time and is easier to maintain. They want secure code for the same reasons. We'll talk about how the definition of secure coding varies among developers and appsec teams, why it's important to understand those perspectives, and how training is just one step towards building a security culture.   Visit https://securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/secweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/vault-asw-3 

Paul's Security Weekly TV
The Psychology of Training - Matias Madou - ASW Vault

Paul's Security Weekly TV

Play Episode Listen Later Jul 5, 2023 35:01


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 23, 2022. Developers want bug-free code -- it frees up their time and is easier to maintain. They want secure code for the same reasons. We'll talk about how the definition of secure coding varies among developers and appsec teams, why it's important to understand those perspectives, and how training is just one step towards building a security culture.   Visit https://securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/secweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/vault-asw-3 

Application Security Weekly (Audio)
The Psychology of Training - Matias Madou - ASW Vault

Application Security Weekly (Audio)

Play Episode Listen Later Jul 5, 2023 35:01


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 23, 2022. Developers want bug-free code -- it frees up their time and is easier to maintain. They want secure code for the same reasons. We'll talk about how the definition of secure coding varies among developers and appsec teams, why it's important to understand those perspectives, and how training is just one step towards building a security culture.   Visit https://securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/secweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/vault-asw-3 

Application Security Weekly (Video)
The Psychology of Training - Matias Madou - ASW Vault

Application Security Weekly (Video)

Play Episode Listen Later Jul 5, 2023 35:01


Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 23, 2022. Developers want bug-free code -- it frees up their time and is easier to maintain. They want secure code for the same reasons. We'll talk about how the definition of secure coding varies among developers and appsec teams, why it's important to understand those perspectives, and how training is just one step towards building a security culture.   Visit https://securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/secweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/vault-asw-3 

Paul's Security Weekly TV
Doing Application Security Right – Farshad Abasi - ASW Vault

Paul's Security Weekly TV

Play Episode Listen Later May 30, 2023 35:46


Check out this interview from the ASW VAULT, hand picked by main host Mike Shema! This segment was originally published on March 14, 2022.   Cybersecurity is a large and often complex domain, traditionally focused on the infrastructure and general information security, with little or no attention to Application Security. Security providers usually tack-on AppSec services to their existing menu of offering without understanding the domain, and their team of professionals have little or no experience with software development or inner workings of modern application architectures. As the world turns Digital at a rapid pace accelerated by the recent pandemic, applications become common place in our lives, providing attackers more opportunities to exploit these poorly protected applications. As such, it is important to know what is actually required to build and run software securely, and how to do application security right. Segment Resources: https://forwardsecurity.com/2022/03/07/application-security-for-busy-tech-execs/    Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/vault-asw-1 

Application Security Weekly (Audio)
Doing Application Security Right – Farshad Abasi – ASW VAULT

Application Security Weekly (Audio)

Play Episode Listen Later May 30, 2023 35:46


Check out this interview from the ASW VAULT, hand picked by main host Mike Shema! This segment was originally published on March 14, 2022. Cybersecurity is a large and often complex domain, traditionally focused on the infrastructure and general information security, with little or no attention to Application Security. Security providers usually tack-on AppSec services to their existing menu of offering without understanding the domain, and their team of professionals have little or no experience with software development or inner workings of modern application architectures. As the world turns Digital at a rapid pace accelerated by the recent pandemic, applications become common place in our lives, providing attackers more opportunities to exploit these poorly protected applications. As such, it is important to know what is actually required to build and run software securely, and how to do application security right. Segment Resources: https://forwardsecurity.com/2022/03/07/application-security-for-busy-tech-execs/   Show notes: https://www.scmagazine.com/podcast-episode/asw-188-farshad-abasi 

Application Security Weekly (Video)
Doing Application Security Right - Farshad Abasi - ASW Vault

Application Security Weekly (Video)

Play Episode Listen Later May 30, 2023 35:46


Check out this interview from the ASW VAULT, hand picked by main host Mike Shema! This segment was originally published on March 14, 2022.   Cybersecurity is a large and often complex domain, traditionally focused on the infrastructure and general information security, with little or no attention to Application Security. Security providers usually tack-on AppSec services to their existing menu of offering without understanding the domain, and their team of professionals have little or no experience with software development or inner workings of modern application architectures. As the world turns Digital at a rapid pace accelerated by the recent pandemic, applications become common place in our lives, providing attackers more opportunities to exploit these poorly protected applications. As such, it is important to know what is actually required to build and run software securely, and how to do application security right. Segment Resources: https://forwardsecurity.com/2022/03/07/application-security-for-busy-tech-execs/    Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/vault-asw-1 

Paul's Security Weekly
Doing Application Security Right - Farshad Abasi - ASW VAULT

Paul's Security Weekly

Play Episode Listen Later May 29, 2023 35:46


Check out this interview from the ASW VAULT, hand picked by main host Mike Shema! This segment was originally published on March 14, 2022. Cybersecurity is a large and often complex domain, traditionally focused on the infrastructure and general information security, with little or no attention to Application Security. Security providers usually tack-on AppSec services to their existing menu of offering without understanding the domain, and their team of professionals have little or no experience with software development or inner workings of modern application architectures. As the world turns Digital at a rapid pace accelerated by the recent pandemic, applications become common place in our lives, providing attackers more opportunities to exploit these poorly protected applications. As such, it is important to know what is actually required to build and run software securely, and how to do application security right. Segment Resources: https://forwardsecurity.com/2022/03/07/application-security-for-busy-tech-execs/ Show notes: https://www.scmagazine.com/podcast-episode/asw-188-farshad-abasi 

Paul's Security Weekly
Throwback Episode - Dev(Sec)Ops Scanning Challenges & Tips - ASW 170

Paul's Security Weekly

Play Episode Listen Later Jan 17, 2023 69:36


We're aren't recording this holiday week, so enjoy this ASW throwback episode! Main host Mike Shema selected this episode to share as it's still relevant to the AppSec community today.    This week, we welcome Nuno Loureiro, CEO at Probely, and Tiago Mendo, CTO at Probely, to talk about Dev(Sec)Ops Scanning Challenges & Tips! There's a plenitude of ways to do Dev(Sec)Ops, and each organization or even each team uses a different approach. Questions such as how many environments you have and the frequency of deployment of those environments are important to understand how to integrate a security scanner in your DevSecOps processes. It all comes down to speed, how fast can I scan the new deployment? Discussion around the challenges on how to integrate a DAST scanner in DevSecOps and some tips to make it easier.   In the AppSec News: View source good / vuln bad, IoT bad / rick-roll good, analyzing the iOS 15.0.2 patch to develop an exploit, bypassing reviews with GitHub Actions, & more NIST DevSecOps guidance!   Show Notes: https://securityweekly.com/asw170   Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Application Security Weekly (Audio)
Throwback Episode - Dev(Sec)Ops Scanning Challenges & Tips - ASW170

Application Security Weekly (Audio)

Play Episode Listen Later Jan 17, 2023 69:36


We're aren't recording this holiday week, so enjoy this ASW throwback episode! Main host Mike Shema selected this episode to share as it's still relevant to the AppSec community today.    This week, we welcome Nuno Loureiro, CEO at Probely, and Tiago Mendo, CTO at Probely, to talk about Dev(Sec)Ops Scanning Challenges & Tips! There's a plenitude of ways to do Dev(Sec)Ops, and each organization or even each team uses a different approach. Questions such as how many environments you have and the frequency of deployment of those environments are important to understand how to integrate a security scanner in your DevSecOps processes. It all comes down to speed, how fast can I scan the new deployment? Discussion around the challenges on how to integrate a DAST scanner in DevSecOps and some tips to make it easier.   In the AppSec News: View source good / vuln bad, IoT bad / rick-roll good, analyzing the iOS 15.0.2 patch to develop an exploit, bypassing reviews with GitHub Actions, & more NIST DevSecOps guidance!   Show Notes: https://securityweekly.com/asw170   Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Application Security Weekly (Video)
Deceptive Diffs From Subversive Submitters - ASW #148

Application Security Weekly (Video)

Play Episode Listen Later Apr 26, 2021 38:16


We start with the article about "Researchers Secretly Tried To Add Vulnerabilities to Linux Kernel, Ended Up Getting Banned" and explore its range of issues from ethics to securing huge, distributed software projects. It's hardly novel to point out that bad actors can attempt to introduce subtle and exploitable bugs. More generally, we've also seen impacts from package owners who have revoked their code, like NPM leftpad, or who transfer ownership to actors who later on abuse the package's reputation, as we've seen in Chrome Plugins. So, what could have been a better research focus? In the era of more pervasive fuzzing, how much should we continue to rely on people for security code review?    For additional resources please visit: Deceptive Diffs From Subversive Submitters - ASW #148 Featuring: John Kinsella (https://www.linkedin.com/in/jlkinsel), Mike Shema (https://www.linkedin.com/in/zombie).    Read the research paper at https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/OpenSourceInsecurity.pdf   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw148

Paul's Security Weekly TV
Deceptive Diffs From Subversive Submitters - ASW #148

Paul's Security Weekly TV

Play Episode Listen Later Apr 26, 2021 38:16


We start with the article about "Researchers Secretly Tried To Add Vulnerabilities to Linux Kernel, Ended Up Getting Banned" and explore its range of issues from ethics to securing huge, distributed software projects. It's hardly novel to point out that bad actors can attempt to introduce subtle and exploitable bugs. More generally, we've also seen impacts from package owners who have revoked their code, like NPM leftpad, or who transfer ownership to actors who later on abuse the package's reputation, as we've seen in Chrome Plugins. So, what could have been a better research focus? In the era of more pervasive fuzzing, how much should we continue to rely on people for security code review?   For additional resources please visit: Deceptive Diffs From Subversive Submitters - ASW #148 Featuring: John Kinsella (https://www.linkedin.com/in/jlkinsel), Mike Shema (https://www.linkedin.com/in/zombie). Read the research paper at https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/OpenSourceInsecurity.pdf   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw148

Software Security Gurus
Software Security Gurus Episode #17: Mike Shema

Software Security Gurus

Play Episode Listen Later Feb 18, 2021 22:20


Welcome to episode 17 of the Software Security Gurus webcast. In this interview, he chats with Mike Shema, Product Security at Square. They discuss his take on proactive security, and the how the relationship between deveopers and the security team impacts this approach. They also unpack the collaborative role these teams can play, and the secret ingredient to a successful shift left. Have you got a topic idea in mind, or want to nominate a guru? Get in touch! www.softwaresecuritygurus.com --- Send in a voice message: https://anchor.fm/softwaresecuritygurus/message

The Secure Developer
Ep. #82, Two Angles of Application and Product Security with Mike Shema

The Secure Developer

Play Episode Listen Later Nov 26, 2020 38:12


Today's guest, Mike Shema, is no stranger to podcasts. As the host of the Application Security Weekly show, he has firsthand insights into the trends and movements in the industry. When he is not on air, Mike works with developers at Square to protect applications, their data, and their users. With a broad range of AppSec experience, from manual security testing to building a commercial web scanner and helping teams build secure products, he has seen it all. In this episode, we hear about Mike's moderator role at Square and how it ties into the organization's engineering-biased security approach. We learn about their partnership strategy, how they split up cloud and governance security, and the benefits of specialist teams. Mike candidly shares how his empathy for developers has grown over the years, and as such, he is cognizant of not playing the gatekeeper role. The conversation goes to tooling, where Mike sheds light on his ‘why bother?' addition to the age-old question of whether to build or buy. Moving away from his work at Square, we then take a look at some of the industry developments he has picked up on as a podcast host himself. He talks about how developers have leapfrogged security teams over the past few years and why this is a good thing for the industry. Be sure to tune in to hear this and much more.

moving security product square application angles appsec mikeshema application security weekly
Application Security Weekly (Video)
Security Is a Feature - Keith Hoodlet - ASW #129

Application Security Weekly (Video)

Play Episode Listen Later Nov 10, 2020 41:58


What does it take to manage security teams and security initiatives? Find out the importance of people in security, whether it's keeping a team engaged or encouraging a team to rethink how they approach security.   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/asw129

Paul's Security Weekly TV
Security Is a Feature - Keith Hoodlet - ASW #129

Paul's Security Weekly TV

Play Episode Listen Later Nov 10, 2020 41:58


What does it take to manage security teams and security initiatives? Find out the importance of people in security, whether it's keeping a team engaged or encouraging a team to rethink how they approach security.   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/asw129

Beyond Synth
Beyond Synth - 247 - VHxRR / Mike Shema

Beyond Synth

Play Episode Listen Later Jul 17, 2020 147:21


If you’d like to support the show, please visit: www.patreon.com/beyondsynth The Beyond Synth theme song is by OGRE: ogresound.bandcamp.com/track/shore-thing 
BEYOND SYNTH ARTIST DATABASE: https://www.beyondsynth.com/ Submit music for consideration: beyondsynth@gmail.com Beyond Synth Discord: https://discord.gg/8ywUrQk Check out VH x RR here: https://vhxrr.bandcamp.com/ https://twitter.com/vhxrr https://open.spotify.com/artist/3kZhs0pEsCHXOOgwwVNjQh?si=WX9TxwjzSVGOWvC8NMQu2A https://twitter.com/LakeshoreRecs https://www.facebook.com/VH-x-RR-113481937049998/ Check out ROB ROWE’s projects here: CAUSE AND EFFECT: http://www.causeandeffect.com/ https://www.facebook.com/CauseAndEffectMusic/ https://twitter.com/_causeandeffect https://www.youtube.com/user/causeandeffectmusic WHITE WAITS: https://soundcloud.com/whitewaits https://whitewaits.bandcamp.com/ https://www.facebook.com/Whitewaits http://www.whitewaits.com/ https://twitter.com/whitewaits Check out VON HERTZOG here: https://soundcloud.com/vonhertzog http://vonhertzog.com/ https://twitter.com/Von_Hertzog https://www.facebook.com/VonHertzog And check out ALL the artists featured on today’s show: ALL HAIL THE SILENCE: https://soundcloud.com/allhailthesilence https://www.facebook.com/allhailthesilence/ https://www.allhailthesilence.com/ https://twitter.com/thesilence https://www.youtube.com/channel/UCHE4ksb-ODFNQlqccJWMpGw JOHN DUNDER: https://soundcloud.com/johndunder https://johndunder.bandcamp.com/ https://www.instagram.com/johndunderz/ https://open.spotify.com/artist/0wq4tKBt3QVyajrRbt9rAv?si=82mtPO2vRcOPukOhT61CXA https://www.youtube.com/watch?v=DTAV9no8RfI&feature=youtu.be KING STEPHEN: https://soundcloud.com/kingstephenmusic http://kingstephenmusic.bandcamp.com https://www.facebook.com/KingStephenMusic/ https://www.instagram.com/kingstephenmusic/ https://twitter.com/_KingStephen88_ https://open.spotify.com/artist/0U4CYkG0Aggl62zvIJXHJL LAU: https://laufares.bandcamp.com/ https://www.instagram.com/laufares/ https://twitter.com/lau_fares https://www.facebook.com/aztrec/ LACQUER GLAZE: https://soundcloud.com/lacquerglaze FRANK REDUX: https://soundcloud.com/frank-redux http://frankredux.bandcamp.com https://www.youtube.com/channel/UCbnrsyl8n1UxZHqPurpLhbQ https://www.instagram.com/frank.redux/ STRIKE EAGLE: http://strikeeaglesynth.com https://www.facebook.com/strikeeagleband/ https://twitter.com/strikeeagleband THE CROW: https://soundcloud.com/wavetraveler http://thecrow.bandcamp.com https://twitter.com/fernandogm1990_ https://www.youtube.com/channel/UC2zeWtyhfjR--VHjWDXVK6Q?view_as=subscriber https://www.instagram.com/fernandogm1990/

rr ogre cause and effect vh strike eagle rob rowe mikeshema beyond synth
Application Security Weekly (Video)
Apps Are the New Endpoint - Catherine Chambers - ASW #109

Application Security Weekly (Video)

Play Episode Listen Later Jun 2, 2020 32:47


Apps are everywhere. Increasingly apps are the main entry point for daily services such as banking, home security or even unlocking a car. But mobile devices are untrustworthy: a place where hackers can reverse engineer apps, tamper with them, and steal the secrets they hold. As apps become the new endpoints, it’s high time to reconsider their security. In this webcast Catherine Chambers, Senior product manager, will discuss why Security needs to be on your app’s feature list.   To learn more about Irdeto, visit: https://securityweekly.com/irdeto Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode109

Paul's Security Weekly TV
Apps Are the New Endpoint - Catherine Chambers - ASW #109

Paul's Security Weekly TV

Play Episode Listen Later Jun 2, 2020 32:47


Apps are everywhere. Increasingly apps are the main entry point for daily services such as banking, home security or even unlocking a car. But mobile devices are untrustworthy: a place where hackers can reverse engineer apps, tamper with them, and steal the secrets they hold. As apps become the new endpoints, it’s high time to reconsider their security. In this webcast Catherine Chambers, Senior product manager, will discuss why Security needs to be on your app’s feature list.   To learn more about Irdeto, visit: https://securityweekly.com/irdeto Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode109

Paul's Security Weekly TV
How to Prevent Account Takeover Attacks - John Chirhart - ASW #109

Paul's Security Weekly TV

Play Episode Listen Later Jun 1, 2020 35:26


Attackers are using methods such as password spraying and credential theft to commit fraud against websites at an alarming rate. Automated bots are aiding the attacker to conduct these operations at scale. Your defensive strategy should include a mechanism to determine if a session is being controlled by a real user or a bot. How can we best accomplish this without creating too much friction between the real users and your web applications?   To learn more about Google Cloud and reCAPTCHA, visit: https://securityweekly.com/recaptcha To register for our upcoming webcast with Google Cloud: https://attendee.gotowebinar.com/register/886342018982842384?source=ASW Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode109

Application Security Weekly (Video)
How to Prevent Account Takeover Attacks - John Chirhart - ASW #109

Application Security Weekly (Video)

Play Episode Listen Later Jun 1, 2020 35:26


Attackers are using methods such as password spraying and credential theft to commit fraud against websites at an alarming rate. Automated bots are aiding the attacker to conduct these operations at scale. Your defensive strategy should include a mechanism to determine if a session is being controlled by a real user or a bot. How can we best accomplish this without creating too much friction between the real users and your web applications?   To learn more about Google Cloud and reCAPTCHA, visit: https://securityweekly.com/recaptcha To register for our upcoming webcast with Google Cloud: https://attendee.gotowebinar.com/register/886342018982842384?source=ASW Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode109

Application Security Weekly (Video)
Using Rate Limiting to Protect Web Apps and APIs - Jack Zarris - ASW #108

Application Security Weekly (Video)

Play Episode Listen Later May 18, 2020


Rate limiting can be used to protect against a number of modern web application and API attacks. We’ll discuss some of those attacks, including Object ID enumeration, in detail, will demo an attack and will show how using rate limiting in our solution can protect against these attacks.   To learn more about Signal Sciences, visit: https://securityweekly.com/signalsciences Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode108

Paul's Security Weekly TV
Using Rate Limiting to Protect Web Apps and APIs - Jack Zarris - ASW #108

Paul's Security Weekly TV

Play Episode Listen Later May 18, 2020


Rate limiting can be used to protect against a number of modern web application and API attacks. We’ll discuss some of those attacks, including Object ID enumeration, in detail, will demo an attack and will show how using rate limiting in our solution can protect against these attacks.   To learn more about Signal Sciences, visit: https://securityweekly.com/signalsciences Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode108

Paul's Security Weekly TV
Psychic Paper, Salt RCE, & Love Bugs - ASW #106

Paul's Security Weekly TV

Play Episode Listen Later May 5, 2020 33:09


This week in the Application Security News, “Psychic Paper” demonstrates why a lack of safe and consistent parsing of XML is disturbing, Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams, Salt Bugs Allow Full RCE as Root on Cloud Servers, Managing risk in today’s IoT landscape: not a one-and-done, and Love Bug's creator tracked down to repair shop in Manila!   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode106

Application Security Weekly (Video)
Psychic Paper, Salt RCE, & Love Bugs - ASW #106

Application Security Weekly (Video)

Play Episode Listen Later May 5, 2020 33:09


This week in the Application Security News, “Psychic Paper” demonstrates why a lack of safe and consistent parsing of XML is disturbing, Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams, Salt Bugs Allow Full RCE as Root on Cloud Servers, Managing risk in today’s IoT landscape: not a one-and-done, and Love Bug's creator tracked down to repair shop in Manila!   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode106

Paul's Security Weekly TV
The Benefits of SAST and SCA in Your IDE - Utsav Sanghani - ASW #101

Paul's Security Weekly TV

Play Episode Listen Later Mar 24, 2020 38:28


Static application security testing (SAST) is critical for uncovering and eliminating issues in proprietary code. However, over 60% of the code in an average application today is composed of open source components. SAST isn't designed to find open source vulnerabilities (CVEs) or identify open source licenses. And manually maintaining a repository of approved open source components for developers is inefficient and time-consuming. That’s where software composition analysis (SCA) comes in. Introducing a new functionality within the Code Sight IDE plugin that combines SAST and SCA in one place to enable secure development.   For more information, visit: https://securityweekly.com/synopsys Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode101

Application Security Weekly (Video)
The Benefits of SAST and SCA in Your IDE - Utsav Sanghani - ASW #101

Application Security Weekly (Video)

Play Episode Listen Later Mar 23, 2020 38:28


Static application security testing (SAST) is critical for uncovering and eliminating issues in proprietary code. However, over 60% of the code in an average application today is composed of open source components. SAST isn't designed to find open source vulnerabilities (CVEs) or identify open source licenses. And manually maintaining a repository of approved open source components for developers is inefficient and time-consuming. That’s where software composition analysis (SCA) comes in. Introducing a new functionality within the Code Sight IDE plugin that combines SAST and SCA in one place to enable secure development.   For more information, visit: https://securityweekly.com/synopsys Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode101

Paul's Security Weekly TV
CISOs, CVE, DevOps, Gandalf - ASW #99

Paul's Security Weekly TV

Play Episode Listen Later Mar 10, 2020 37:17


CVE-2020-0688 Losing the keys to your kingdom, which is why Multiple nation-state groups are hacking Microsoft Exchange servers, Revoking certain certificates on March 4 and Why 3 million Let’s Encrypt certificates are being killed off today, Gandalf: An Intelligent, End-To-End Analytics Service for Safe Deployment in Large-Scale Cloud Infrastructure and slides, CISOs Who Want a Seat at the DevOps Table Better Bring Value. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode99

humans-of-infosec
Ep 21 Caroline Wong: Security Metrics And Motherhood

humans-of-infosec

Play Episode Listen Later Dec 18, 2018 34:01


In this weeks episode, Mike Shema interviews host, Caroline Wong, to learn more about her information security journey. Hearing how she got her start in the infosec industry, exploring her passion for security metrics, and how being a mother has transformed how she manages her time and work.

humans-of-infosec
Ep 1 Mike Shema: OG Web Hacker

humans-of-infosec

Play Episode Listen Later Feb 27, 2018 30:03


Humans Of InfoSec Episode 1, Mike Shema started out as a gamer and hacker in the late 90's. He was part of the elite Foundstone consulting group, built a web application security scanner at Qualys, and led the Product Security team at Yahoo. Today, Mike is the VP of SecOps and Research at Cobalt. Caroline Wong sits down with Mike and discusses his journey and talks about how he has gotten to where he is today.