On this episode, Chris is joined by Josh Grossman, Avi Douglen, and Ofer Maor at AppSec USA. They discuss the AppSec group in Israel and a few important talks you should watch from AppSec USA this year.
You can find Josh on Twitter @JoshCGrossman
You can find Avi on Twitter @sec_tigger
You can find Ofer on Twitter @OferMaor
On this week, we listen in on the #AppSecUSA talk by Chris about Security Culture Hacking.
You can find Chris on Twitter @edgeroute
On this episode, Jim Manico joins again to talk about the ways that AppSec has changed over the years and give us an in-depth look at the history of SQL Injection and XSS.
You can find Jim on Twitter @manicode
On this episode, Chris and Robert talk with Adam and John from HackerOne about Bug Bounty. They dive into bug bounty from the programming side and the security researcher side to show how you can put these pieces together to be successful with bug bounty.
On this week’s episode, Chris is joined by Ofer Maor to talk about his journey about transitioning into the world of #AppSec from the world of Pen Testing.
You can find him on Twitter @OferMaor
Stephen de Vries joins to discuss Threat Modeling and the unique approach that he takes by using tooling. We also discuss application security and startups.
You can find Stephen on Twitter @stephendv
Stephen is the CEO of Continuum Security. You can visit them on the web to find out more about their tool based solution for threat modeling and requirements management.
On this episode, Julien Vehent joins to discuss all things DevOps + Security. We talk through Julien’s new book, Securing DevOps and go in depth as to the journey he went through building security into DevOps at his job.
You can find Julien on Twitter @jvehent
The folks over at Manning Publications have also given a 40% discount on ALL their products to anyone who uses the AppSec Podcast specific discount code.
Discount Code: appsecpodcast18
Ready to Discover the Latest in AppSec?
The Best Part? It’s Free to Listen!
Or subscribe with your favorite app by using the address below: