Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Introduction
00:00 • 3min
Security Weekly Partnering With HackRedCon
02:53 • 4min
DevOps - Cloud Native Application Security
07:08 • 3min
Is Config Hardening or Config Validation Posture Management an Important Thing?
09:56 • 5min
Enabling Automation in DevOps
14:28 • 4min
The Security Guys Need to Understand, Hey, You Got to Update
18:34 • 3min
Security and DevOps Partnerships Need to Be Strengthened
21:54 • 4min
Cloud Security - Is There a Framework for Cloud Security?
26:05 • 4min
CNAAP Security Engineers - What's Going on in DevOps?
30:33 • 5min
DevOps and Security - What's the Difference?
35:32 • 3min
Application Security Weekly - Doug Dooley and John Kinsell
38:49 • 4min
The Twitter Report: Over 50% of Twitter's Data Center Servers Aren't Compliant
42:32 • 2min
Is There a Difference Between AppSec and Facebook?
44:34 • 4min
GitHub
49:02 • 2min
Aok, the Command Line Text Editor
51:03 • 2min
You're Missing Out on the Best Terminal Experience
53:27 • 4min
Cryptocurrency
57:49 • 5min
Is There a Soft Launch for Software-Defined Radios?
01:02:29 • 4min
Is There a 40% Chance That We're Going to See Additional Vulnerability Disclosures?
01:06:23 • 4min
The Red Hat Linux Kernel Credential Swaps
01:10:01 • 2min
What if We Can't Use After Free and Away?
01:11:49 • 3min
What's the Best Tool for Threat Modeling?
01:14:47 • 3min
Are You Defining Empathy?
01:17:52 • 2min
Amida, Mother of All Zero Days, Immortal Flaws in Semiconductors
01:19:47 • 3min