Build Amazing Things (securely) cover art

Build Amazing Things (securely)

Written by: Laura Bell Main
  • Summary

  • Featuring guests from around the world and builders of some of the most exciting technologies on earth, join us as we explore the world of innovation and technology and what we need to do as engineers to keep it safe and secure.
    Copyright 2024 Laura Bell Main
    Show more Show less
Episodes
  • Building AppSec from Existing Practices with Andrew Wheatley (Tayko)
    Jan 23 2024

    In this episode of "Build Amazing Things Securely," host Laura Bell Main sits down with Andrew from Teko. Andrew shares his journey from software development to application security, highlighting his burnout experience and subsequent career pivot. He discusses the importance of understanding and integrating into teams' existing processes, using techniques like Rosebud Thorn for cultural and security growth. Andrew emphasizes learning from mistakes, the value of different perspectives in AppSec, and the future direction of the field.

    Key Points:
    1. Andrew's Background: Transition from software development to a focus on data analytics and application security.
    2. Burnout and Recovery: Andrew's experience with burnout and how it reshaped his career focus towards people and helping others.
    3. Integrating Security into Development: Strategies for seamlessly integrating security measures into existing software development processes.
    4. Rose Bud Thorn Technique: Utilizing this method for understanding team dynamics and improving security culture.
    5. Future of AppSec: Andrew's insights into the evolving role of application security as a facilitator and enabler within development teams.

    Homework (Recommended Actions):
    1. Reflect on Team Processes: Use the Rosebud Thorn technique to identify areas of strength, growth, and challenges within your team.
    2. Learn from Mistakes: Encourage a culture where making and learning from mistakes is valued.
    3. Adopt User-Centric Security: Consider how security measures impact the end user and integrate them thoughtfully into your development process.
    4. Stay Informed: Keep up with the evolving trends in application security to remain effective and relevant in your field.

    Relevant Links:
    • https://easyretro.io/templates/rose-bud-thorn/
    • https://tayko.io/
    • https://www.linkedin.com/in/andrew-wheatley-55247225/

    DYjSn56zeT31N17Upavk

    Show more Show less
    19 mins
  • Unveiling the Layers of Database Security with Dejan Milicic (RavenDB)
    Jan 16 2024
    Episode Summary: "Unveiling the Layers of Database Security"

    In this episode of "Build Amazing Things Securely," host Laura Bell Main engages in a fascinating conversation with Dejan from RavenDB. Broadcasting from Serbia, Dejan provides insightful perspectives on database security, the importance of encryption, and the nuances of building stable, secure database systems. The episode traverses various aspects of database management, emphasizing how ease of use and built-in security can revolutionize database interaction for developers.

    Key Points

    1. **The Evolution of RavenDB**: RavenDB's creation was driven by a desire to solve recurring issues in relational databases, aiming for a "boring" yet reliable database experience.

    2. **Security by Design**: Emphasizes the concept of 'Secure by Default,' ensuring the database is secure upon setup and requires conscious effort to make it less secure.

    3. **Encryption Challenges**: Discusses the complexities and considerations in database encryption, including performance impacts and the necessity of securing backups.

    4. **Pragmatic Database Choices**: Advises on choosing database technologies suited to specific needs, urging a balance between innovation and practical application.

    5. **Transparency and Usability in Security**: Stresses making security features user-friendly to encourage their widespread adoption.

    Links and Resources

    - RavenDB Website: Explore more about RavenDB at [RavenDB.net](https://ravendb.net)

    - GitHub Discussions: Engage with the RavenDB community and find Dan on GitHub discussions for RavenDB.


    Homework

    - **Identify Your HIPPO**: Reflect on your own decision-making processes in software development. Recognize personal biases and opinions that might influence your choices.

    - **Explore RavenDB**: Visit RavenDB's website and GitHub discussions to understand more about their database solutions and community insights.

    - **Engage with the Podcast**: Subscribe to the podcast, share comments, and suggest potential guests or technologies that you’d like to see featured in future episodes.

    - **Security Consciousness**: In your projects, assess how security is integrated. Aim for solutions that are secure by design and default, and consider the impact of every step in your operational procedures.

    Show more Show less
    26 mins
  • How to Build Trust in Tech: Integrating Human Presence with Secure Innovation with Anthony Maley (Vouch.io)
    Jan 9 2024
    Episode Summary

    In this episode of "Build Amazing Things Securely," host Laura Bell Main interviews Anthony Maley from vouch.io. They delve into Anthony's background, his journey from the UK to Belgium, and eventually to the US, as well as the innovative and secure solutions offered by vouch.io. Anthony discusses the challenges and advancements in creating offline-first, shareable security frameworks, emphasizing the need for human presence in increasingly autonomous technological landscapes.

    Key Points

    1. **Anthony Maley's Background**: Co-founder and CEO of vouch.io, Anthony shares his journey from the UK to Belgium and the US, his musical hobbies, and his professional experience in leading tech roles.

    2. **vouch.io's Mission**: They focus on establishing human presence in autonomous technology, ensuring secure and offline verifiable transactions.

    3. **Technology Overview**: vouch.io's product endorses existing identities using biometrics and blockchain, enabling offline, secure transactions and ownership assertions in various industries, including automotive and financial services.

    4. **Security and Privacy**: The discussion covers the importance of data privacy, the avoidance of data centralization, and the ways vouch.io ensures user security.

    5. **Potential and Challenges**: They explore the vast potential of vouch.io's technology in multiple sectors and the balance between innovation and privacy concerns.

    Links and Resources

    - vouch.io website: https://www.vouch.io

    - Strange Loop Conference, St. Louis: https://www.thestrangeloop.com


    Homework

    - Visit vouch.io for more information on the technology and its applications.

    - Engage with the podcast through likes, subscribes, and comments.

    - Suggest potential guests or technologies that are making significant impacts across various fields.


    Additional Notes

    Listeners are encouraged to explore how the intersection of technology and security is evolving and to consider the implications of these advancements in their professional and personal lives.

    Show more Show less
    25 mins

More from the same

Author:

What listeners say about Build Amazing Things (securely)

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.