Épisodes

  • Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
    Dec 2 2025

    For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space.

    Segment Resources:

    Free Cyber OT Training (INL): https://ics-training.inl.gov/

    Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services

    Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up

    More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Show Notes: https://securityweekly.com/asw-359

    Voir plus Voir moins
    59 min
  • Figuring Out Where to Start with Secure Code - ASW #358
    Nov 25 2025

    What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec folks alike -- in crafting code that's secure by design rather than just secure from scanner results.

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Show Notes: https://securityweekly.com/asw-358

    Voir plus Voir moins
    46 min
  • Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
    Nov 18 2025

    Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for helping developers get beyond the superficial advice of, "Think like an attacker."

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Show Notes: https://securityweekly.com/asw-357

    Voir plus Voir moins
    1 h et 4 min
  • Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
    Nov 11 2025

    Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting.

    Segment resources

    • https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/
    • https://www.darkreading.com/endpoint-security/pro-russian-hackers-linux-vms-hide-windows
    • https://www.threatlocker.com/blog/how-to-build-a-robust-lights-out-checklist

    This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them!

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Show Notes: https://securityweekly.com/asw-356

    Voir plus Voir moins
    1 h et 11 min
  • Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
    Nov 4 2025

    Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits, and working with repo owners to improve their security. Their work highlights the challenges in maintaining good security guidance, figuring out secure defaults, and how so many orgs still struggle with triaging external security reports -- something that's becoming even more challenging when orgs are being flooded with low-quality reports from LLMs.

    Segment Resources:

    • https://orca.security/resources/blog/pull-request-nightmare-github-actions-rce/
    • https://orca.security/resources/blog/pull-request-nightmare-part-2-exploits/

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Show Notes: https://securityweekly.com/asw-355

    Voir plus Voir moins
    1 h et 8 min
  • Quantum Computing Isn't A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
    Oct 28 2025

    The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architecture that have to be updated or replaced to complete the migration? Can we get it all done by 2030?

    Sandy Carielli and Martha Bennett join us to answer these questions and dive into one area of tech that hasn't been discussed much when it comes to post-quantum encryption: blockchain.

    Relevant Forrester Reports:

    • Quantum Computing isn't a Threat to Blockchains - Yet
    • The Architect's Guide to Quantum Security

    In the news, high standards for open source software, trends in self-hosting, doing the cloud wrong, and is it really always DNS?

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Show Notes: https://securityweekly.com/asw-354

    Voir plus Voir moins
    59 min
  • Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
    Oct 21 2025

    Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it more secure. And too few software makers are embracing secure by default, let alone secure by design.

    In the news, passively monitoring geosynchronous satellite communications on the cheap, successful LLM poisoning of any size model with a single size dose, security engineering lessons from Signal's post-quantum crypto work, improving security for JavaScript in the browser, and more!

    This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more!

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Show Notes: https://securityweekly.com/asw-353

    Voir plus Voir moins
    1 h et 4 min
  • Inside the OWASP GenAI Security Project - Steve Wilson - ASW #352
    Oct 14 2025

    Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. Whether apps are created by genAI or directly use genAI, the future of securing software is going to be busy.

    Resources

    • https://genai.owasp.org
    • https://genai.owasp.org/llm-top-10/
    • LLM security book on Amazon at https://a.co/d/6LZoXxQ

    This segment is sponsored by The OWASP GenAI Security Project. Visit https://securityweekly.com/owasp to learn more!

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Show Notes: https://securityweekly.com/asw-352

    Voir plus Voir moins
    1 h et 8 min