

The Boring AppSec Podcast
The Boring AppSec Podcast
In this podcast, we will talk about our experiences having worked at different companies - from startups to big enterprises, from tech companies to security companies, and from building side projects to building startups. We will talk about the good, the bad, and everything in between. So join us for some fun, some real, and some super hot takes about all things Security in the Boring AppSec Podcast.
Episodes
Mentioned books

Jan 27, 2025 • 47min
S2E4 - Varun Badhwar
In Season 2 Episode 4, we talk to Varun Badhwar, Founder & CEO @ Endor Labs.
We discuss the current state of application security, the challenges faced by development teams, and the importance of integrating security into the software development lifecycle. Varun shares insights from his previous experiences in building and acquiring cybersecurity companies, emphasizing the need for effective compliance strategies and the balance between platform solutions and best-of-breed tools. In this conversation, Varun Badhwar discusses the evolving landscape of cybersecurity, emphasizing the importance of compliance, product usability, and the integration of AI technologies like LLMs in vulnerability management. He highlights the need for a user-centric approach in AppSec, the challenges of providing context to engineers, and the future implications of AI in security governance.
Key Takeaways
- Endor Labs aims to make AppSec more engaging and effective.
- Many existing AppSec tools create friction between teams.
- The future of software development will involve AI-generated code.
- Understanding the software supply chain is crucial for security.
- Acquisitions in cybersecurity often fail due to integration issues.
- Founders must empathize with practitioner pain to build effective products.
- Compliance often drives security priorities in organizations.
- Effective integration of tools can enhance security outcomes.
- The industry needs to focus on enabling faster business operations.
- Balancing platform capabilities with best-of-breed tools is essential.
- Compliance is essential for sales enablement in cybersecurity.
- First-time founders should focus on product and distribution.
- User experience and developer experience are critical in AppSec products.
- Contextual information is vital for engineers to make informed decisions.
- Automation can help reduce noise in security alerts.
- Reachability analysis improves visibility in code dependencies.
- Impact assessment is crucial for effective vulnerability remediation.
- LLMs can assist in reasoning but need rules for effective application.
- AI governance is a growing concern in the software development space.
- The industry must adapt to the rapid advancements in AI technology.
Tune in to find out more!
Contacting Varun
* LinkedIn: https://www.linkedin.com/in/vbadhwar/
* Endor Labs: https://www.endorlabs.com/
Contacting Anshuman
* LinkedIn: https://www.linkedin.com/in/anshumanbhartiya/
* X: https://x.com/anshuman_bh
* Website: https://anshumanbhartiya.com/
* Instagram: https://www.instagram.com/anshuman.bhartiya
Contacting Sandesh
* LinkedIn: https://www.linkedin.com/in/anandsandesh/
* X: https://x.com/JubbaOnJeans
* Website: https://boringappsec.substack.com/

Jan 20, 2025 • 44min
S2E3 - Robert Wood
In Season 2 Episode 3, we interview Robert Wood, Founder & CEO @ SideKick Security.
We discuss Rob's journey from working at Cigital to starting his own consulting firm, the challenges of point solutions in cybersecurity, and the importance of soft skills in the industry. Rob shares insights on platformization versus services, tailoring security programs to unique needs, and building a security data lake to enhance data sharing and collaboration among teams. The conversation emphasizes the need for effective communication and community engagement in cybersecurity.
Key Takeaways
- Sidekick Security aims to address the challenges of siloed point solutions in cybersecurity.
- Rob emphasizes the importance of soft skills alongside technical skills in cybersecurity roles.
- Platformization can help reduce silos, but unique security needs must be considered.
- Every security program is unique and should be approached accordingly.
- Building a security data lake can enhance data sharing and collaboration among teams.
- Effective communication is crucial for security professionals to succeed.
- Engaging with the community is essential for growth in the cybersecurity field.
- Regulation and governance discussions are crucial as new technologies emerge.
Tune in to find out more!
Contacting Robert
* LinkedIn: https://www.linkedin.com/in/holycyberbatman/
* SideKick Security: https://sidekicksecurity.io/
Contacting Anshuman
* LinkedIn: https://www.linkedin.com/in/anshumanbhartiya/
* X: https://x.com/anshuman_bh
* Website: https://anshumanbhartiya.com/
* Instagram: https://www.instagram.com/anshuman.bhartiya
Contacting Sandesh
* LinkedIn: https://www.linkedin.com/in/anandsandesh/
* X: https://x.com/JubbaOnJeans
* Website: https://boringappsec.substack.com/

Jan 13, 2025 • 49min
S2E2 - Dustin Lehr
In Season 2 Episode 2, we interview Dustin Lehr, Co-Founder, Chief Product & Technology Officer at Katilyst.
We discuss the significance of security champions in application security. We explore the cultural aspects of implementing security champions programs, the challenges of maintaining engagement, and the importance of leadership support. The conversation delves into measuring the success of these programs, the role of behavioral science, and the impact of effective training and gamification in enhancing security awareness within organizations. Dustin discusses the Octalysis framework, which identifies eight core human motivators that can be leveraged in gamification and cybersecurity culture. He emphasizes the importance of building relationships within organizations to change perceptions of security teams and foster a collaborative environment. Dustin also shares insights on the intersection of creativity and cybersecurity, his motivations for starting a company, and the role of AI in enhancing human interactions rather than replacing them.
Key Takeaways
- Security champions programs are crucial for fostering a security culture.
- Engagement and leadership support are key to program success.
- Measuring success can be challenging but is essential.
- Behavioral science plays a significant role in security engagement.
- Gamification can enhance training but must be used wisely.
- Curiosity can drive initial engagement but must be sustained.
- Training should be relevant and tailored to the audience.
- Creating empathy between teams improves security outcomes.
- Deep gamification focuses on understanding human drives.
- Starting a company is about helping others, not just profit.
- AI can augment human interactions but cannot replace them.
- Security teams should focus on providing value and support.
- Human connection is essential in cybersecurity.
- The importance of community and collaboration in security efforts.
Tune in to find out more!
Contacting Dustin
* LinkedIn: https://www.linkedin.com/in/dustinlehr/
* Security Champion Success Guide: https://securitychampionsuccessguide.org/
Contacting Anshuman
* LinkedIn: https://www.linkedin.com/in/anshumanbhartiya/
* X: https://x.com/anshuman_bh
* Website: https://anshumanbhartiya.com/
* Instagram: https://www.instagram.com/anshuman.bhartiya
Contacting Sandesh
* LinkedIn: https://www.linkedin.com/in/anandsandesh/
* X: https://x.com/JubbaOnJeans
* Website: https://boringappsec.substack.com/

Jan 6, 2025 • 54min
S2E1 - Jimmy Mesta
In Season 2 Episode 1, we interview Jimmy Mesta, a seasoned expert in application security and co-founder of RAD Security.
We discuss the evolution of Kubernetes, its security challenges, and the importance of understanding the complexities of cloud-native infrastructure. Jimmy shares insights from his journey of starting a company, the role of AI in security, and the nuances of investing in security startups. The conversation highlights the need for a comprehensive approach to security that encompasses both application and infrastructure aspects, as well as the importance of mentorship and community in the startup ecosystem.
Key Takeaways
- RAD Security aims to address real-time security for cloud-native infrastructure.
- Kubernetes has evolved significantly, but security challenges remain.
- Managed Kubernetes services have simplified deployment but not security.
- Starting a company requires surrounding yourself with experienced mentors.
- RASP solutions faced implementation challenges despite their potential.
- Defining applications in a microservices architecture is complex.
- AI presents both opportunities and skepticism in the security space.
- Investing in startups requires trust and understanding of the founder's journey.
- Efficiency in security operations is crucial for success.
Tune in to find out more!
Contacting Jimmy
* LinkedIn: https://www.linkedin.com/in/jimmymesta/
* X: https://x.com/jimmesta
Contacting Anshuman
* LinkedIn: https://www.linkedin.com/in/anshumanbhartiya/
* X: https://x.com/anshuman_bh
* Website: https://anshumanbhartiya.com/
* Instagram: https://www.instagram.com/anshuman.bhartiya
Contacting Sandesh
* LinkedIn: https://www.linkedin.com/in/anandsandesh/
* X: https://x.com/JubbaOnJeans
* Website: https://boringappsec.substack.com/

May 20, 2024 • 51min
S1E10 - Future Security Predictions
Welcome to the Boring AppSec Podcast! In Episode 10, we discuss some security predictions that we hope to see in the near future. Some of them are:
AI agents - different kinds - activity based and/or persona based
Security talent is going to get better, hiring is important
AI powered security engineers - up leveling junior engineers
AI code review assistants - GPT4-o et al
Company consolidations happening in the security industry - D&R space
ASPM predictions and how AI agents will help evolve this space
CISA’s guidance on building secure by default frameworks
Automated red teaming
Hiring security engineers vs changes in interviewing
Tune in to find out more!
References mentioned in the episode:
OpenAI Security Bots - https://github.com/openai/openai-security-bots
Build an AI Appsec Team - https://srajangupta.substack.com/p/building-an-ai-appsec-team
CISA and secure design - https://www.cisa.gov/news-events/news/cisa-announces-secure-design-commitments-leading-technology-providers
Awesome secure defaults - https://github.com/tldrsec/awesome-secure-defaults
Slack vs MSFT teams - https://x.com/TrungTPhan/status/1640866391485194241
The Innovator's Dilemma - https://www.amazon.com/Innovators-Dilemma-Revolutionary-Change-Business/dp/0062060244
Contacting Anshuman
LinkedIn: https://www.linkedin.com/in/anshumanbhartiya/
Twitter: https://twitter.com/anshuman_bh
Website: https://anshumanbhartiya.com/
Instagram: https://www.instagram.com/anshuman.bhartiya/
YouTube: https://www.youtube.com/@AnshumanBhartiya
Contacting Sandesh
LinkedIn: https://www.linkedin.com/in/anandsandesh/
Twitter: https://twitter.com/JubbaOnJeans/
Website: https://boringappsec.substack.com/

May 13, 2024 • 38min
S1E09 - Incidents
Welcome to the Boring AppSec Podcast! In Episode 9, we discuss incidents. Both Sandesh and I share 2 incidents each and the lessons learnt from them. Tune in!
References mentioned in the episode:
Log4j - https://www.cisa.gov/news-events/news/apache-log4j-vulnerability-guidance
Incident runbook - https://engineering.razorpay.com/how-an-incident-transformed-razorpay-improving-the-5-why-rca-format-378de299b9a2
Contacting Anshuman
LinkedIn: https://www.linkedin.com/in/anshumanbhartiya/
Twitter: https://twitter.com/anshuman_bh
Website: https://anshumanbhartiya.com/
Instagram: https://www.instagram.com/anshuman.bhartiya/
YouTube: https://www.youtube.com/@AnshumanBhartiya
Contacting Sandesh
LinkedIn: https://www.linkedin.com/in/anandsandesh/
Twitter: https://twitter.com/JubbaOnJeans/
Website: https://boringappsec.substack.com/

Apr 22, 2024 • 46min
S1E08 - Bug Bounties Part 2
Welcome to the Boring AppSec Podcast! In Episode 8, we continue discussing bug bounties from where we left off in Episode 3. We discuss how to build mature bug bounty programs, how to start a program, how to convince stake holders to start a program, differences and similarities between vulnerability disclosure programs and bug bounty programs among other things. Tune in!
Contacting Anshuman
LinkedIn: https://www.linkedin.com/in/anshumanbhartiya/
Twitter: https://twitter.com/anshuman_bh
Website: https://anshumanbhartiya.com/
Instagram: https://www.instagram.com/anshuman.bhartiya/
YouTube: https://www.youtube.com/@AnshumanBhartiya
Contacting Sandesh
LinkedIn: https://www.linkedin.com/in/anandsandesh/
Twitter: https://twitter.com/JubbaOnJeans/
Website: https://boringappsec.substack.com/

Apr 15, 2024 • 55min
S1E07 - Hiring in Security
Welcome to the Boring AppSec Podcast! In Episode 7, we discuss how to hire the right security folks on a security engineering team. We go over the interviewing process, what to look out for, how to compose a team, and also share some of our experiences of interviewing including some tips on what a candidate can/should do if they want to get noticed by hiring managers and recruiters.
Contacting Anshuman
LinkedIn: https://www.linkedin.com/in/anshumanbhartiya/
Twitter: https://twitter.com/anshuman_bh
Website: https://anshumanbhartiya.com/
Instagram: https://www.instagram.com/anshuman.bhartiya/
YouTube: https://www.youtube.com/@AnshumanBhartiya
Contacting Sandesh
LinkedIn: https://www.linkedin.com/in/anandsandesh/
Twitter: https://twitter.com/JubbaOnJeans/
Website: https://boringappsec.substack.com/

Apr 8, 2024 • 57min
S1E06 - Vulnerability Management
Welcome to the Boring AppSec Podcast! In Episode 6, we discuss the art of Vulnerability Management. What it means, what are some of the problems we've seen as practitioners, what are some ways we've considered to make the process of managing vulnerabilities easy.
References:
We will try and add information about all the references we make here. Please enter rabbit holes at will :)
Gitlab's Security Handbook - https://handbook.gitlab.com/handbook/security/
Contacting Anshuman
LinkedIn: https://www.linkedin.com/in/anshumanbhartiya/
Twitter: https://twitter.com/anshuman_bh
Website: https://anshumanbhartiya.com/
Instagram: https://www.instagram.com/anshuman.bhartiya/
YouTube: https://www.youtube.com/@AnshumanBhartiya
Contacting Sandesh
LinkedIn: https://www.linkedin.com/in/anandsandesh/
Twitter: https://twitter.com/JubbaOnJeans/
Website: https://boringappsec.substack.com/

Apr 1, 2024 • 1h 2min
S1E05 - Threat Modeling
Welcome to the Boring AppSec Podcast! In Episode 5, we dig deep into what threat modeling is from a practitioner's perspective. We compare it with design reviews and discuss when/how/why of threat modeling. In the end, we wrap up by talking about how Gen AI could help threat modeling significantly.
References:
We will try and add information about all the references we make here. Please enter rabbit holes at will :)
Threat modeling manifesto - Threatmodelingmanifesto.org
STRIDE framework - https://en.wikipedia.org/wiki/STRIDE_(security)
Tools for threat modeling
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool
https://www.iriusrisk.com/threat-modeling/freemium
https://owasp.org/www-project-threat-dragon/
https://excalidraw.com/
https://www.securitycompass.com/sdelements/
Talks on threat modeling
https://www.youtube.com/watch?v=KGy_KCRUGd4
https://www.youtube.com/watch?v=wVSyqFdO-D8
Articles - https://www.scaletozero.com/episodes/understanding-threat-modeling-with-jeevan-singh/
Gen AI related threat modeling tools/companies
Stride GPT- https://stridegpt.streamlit.app/
Nullify - https://www.nullify.ai/
Remysec - https://www.remysec.com/
Seezo - https://seezo.io/
https://www.sarahtavel.com/p/ai-startups-sell-work-not-software
https://github.com/captn3m0/ideas
Contacting Anshuman
LinkedIn: https://www.linkedin.com/in/anshumanbhartiya/
Twitter: https://twitter.com/anshuman_bh
Website: https://anshumanbhartiya.com/
Instagram: https://www.instagram.com/anshuman.bhartiya/
YouTube: https://www.youtube.com/@AnshumanBhartiya
Contacting Sandesh
LinkedIn: https://www.linkedin.com/in/anandsandesh/
Twitter: https://twitter.com/JubbaOnJeans/
Website: https://boringappsec.substack.com/


