This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Podcast"
Mark Miller (talk | contribs) m |
Mark Miller (talk | contribs) (Tag: Visual edit) |
||
(19 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | <div style="font-size:7pt;text-align:right"> | + | <div style="font-size:7pt;text-align:right"></div> |
− | </div> | ||
− | = | + | = DevSecOps Podcast Series = |
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
− | + | The DevSecOps Podcast is series of recorded broadcasts, highlighting OWASP projects and chapters, and DevSecOps practitioners from around the world. The DevSecOps Podcast is available on demand, at anytime, anywhere on the planet. You are welcome to embed the broadcasts on your page, download them for your personal listening or keep up to date by subscribing to the [https://soundcloud.com/owasp-podcast SoundCloud Channel]. | |
− | < | + | '''Listen to [https://soundcloud.com/owasp-podcast All Available Broadcasts] or choose a single episode below''' |
+ | |||
+ | # [https://www.devsecopsdays.com/devsecops-podcast-gallery/podcasts/how-to-engage-4000-in-one-day How to Engage 4000 Developers in One Day] | ||
+ | # [https://www.devsecopsdays.com/devsecops-podcast-gallery/podcasts/code-rush-devops-and-google-software-in-the-fast-lane Code Rush, DevOps and Google: Software in the Fast Lane] | ||
+ | # [https://www.devsecopsdays.com/devsecops-podcast-gallery/podcasts/the-unicorn-project-w/-gene-kim-podcast The Unicorn Project w/ Gene Kim] | ||
+ | # [https://www.devsecopsdays.com/devsecops-podcast-gallery/podcasts/devops-devsecops-and-the-year-ahead-with-sacha-labourey DevOps, DevSecOps and the Year Ahead w/ Sacha Labourey] | ||
+ | # [https://www.devsecopsdays.com/devsecops-podcast-gallery/podcasts/is-it-time-to-trust-equifax-again Is it time to trust Equifax again? You decide.] | ||
+ | # [https://www.devsecopsdays.com/devsecops-podcast-gallery/podcasts/2019-global-appsec-conf-dc 2019 Global AppSec Conference, DC] | ||
+ | # [https://www.devsecopsdays.com/devsecops-podcast-gallery/podcasts/2019-state-of-the-software-supply-chain-podcast State of the Software Supply Chain Report] | ||
+ | # [https://soundcloud.com/owasp-podcast/the-vanity-of-diversity The Vanity of Diversity w/ Loni Rosales] | ||
+ | # [https://soundcloud.com/owasp-podcast/creating-internal-tech-conferences Create and Manage Internal Tech Conferences] | ||
+ | # [https://soundcloud.com/owasp-podcast/securing-the-software-supply-chain-live-panel-for-international-conference-on-cyber-engagement Securing the Software Supply Chain - Live Panel for International Conference on Cyber Engagement] | ||
+ | # [https://soundcloud.com/owasp-podcast/tel-aviv-and-the-2019-global-appsec-conference Tel Aviv and the 2019 Global AppSec Conference] | ||
+ | # [https://soundcloud.com/owasp-podcast/persectives-on-the-sec-in-devsecops-w-tanya-janca Perspectives on the "Sec" in DevSecOps w/ Tanya Janca] | ||
+ | # [https://soundcloud.com/owasp-podcast/2019-open-security-summit-preview 2019 Open Security Summit Preview] | ||
+ | # [https://soundcloud.com/owasp-podcast/what-is-an-s-bom-and-why-should-you-care-w-allan-friedman What is an SBOM and Why Should You Care? w/ Allan Friedman] | ||
+ | # [https://soundcloud.com/owasp-podcast/what-is-chaos-engineering-an-interview-with-casey-rosenthal What is Chaos Engineering, an Interview with Casey Rosenthal] | ||
+ | # [https://soundcloud.com/owasp-podcast/ladies-of-london-hacking-society-w-eliza-may-austin Ladies of London Hacking Society w/ Eliza-May Austin] | ||
+ | # [https://soundcloud.com/owasp-podcast/anticipating-failure-through-threat-modeling-w-adam-shostack Anticipating Failure through Threat Modeling w/ Adam Shostack] | ||
+ | # [https://soundcloud.com/owasp-podcast/we-are-all-special-snowflakes-with-chris-roberts We Are All Special Snowflakes with Chris Roberts] | ||
+ | # [https://soundcloud.com/owasp-podcast/a-concise-introduction-to-devsecops A Concise Introduction to DevSecOps] | ||
+ | # [https://soundcloud.com/owasp-podcast/whats-in-store-for-the-appsec-cali-conference-w-richard-greenberg What's In Store for the AppSec Cali Conference w/ Richard Greenberg] | ||
+ | # [https://soundcloud.com/owasp-podcast/epic-failures-in-devsecops-w-aubrey-stearn Epic Failures in DevSecOps w/ Aubrey Stearn] | ||
+ | # [https://soundcloud.com/owasp-podcast/strategic-asymetry-leveling-the-playing-field-w-chetan-conikee Strategic Asymetry - Leveling the Playing Field w/ Chetan Conikee] | ||
+ | # [https://soundcloud.com/owasp-podcast/threat-modeling-a-disaster-story-with-edwin-kwan Threat Modeling - A Disaster Story with Edwin Kwan] | ||
+ | # [https://soundcloud.com/owasp-podcast/the-devsecops-unicorn-rodeo-w-stefan-streichsbier The DevSecOps Unicorn Rodeo w/ Stefan Streichsbier] | ||
+ | # [https://soundcloud.com/owasp-podcast/the-devsecops-experiment The DevSecOps Experiment with DJ Schleen] | ||
+ | # [https://soundcloud.com/owasp-podcast/open-source-vulnerabilities-who-is-ultimately-responsible Open Source Vulnerabilities - Who is Ultimately Responsible] | ||
+ | # [https://soundcloud.com/owasp-podcast/event-stream-analysis-of-a-compromised-npm-package event-stream: Analysis of a Compromised npm Package] | ||
+ | # [https://soundcloud.com/owasp-podcast/spy-vs-spy-harvesting-adversaries Spy vs Spy in Application Security: Harvesting Adversaries] | ||
+ | # [https://soundcloud.com/owasp-podcast/moving-from-projects-to-products-w-mik-kersten Moving from Projects to Products w/ Mik Kersten] | ||
+ | # [https://soundcloud.com/owasp-podcast/the-journey-to-open-source-at-capital-one-w-tapabrata-topo-pal The Journey to Open Source at Capital One w/ Tapabrata "Topo" Pal] | ||
+ | # [https://soundcloud.com/owasp-podcast/the-future-of-software-and-devops-with-sacha-labourey The Future of Software and DevOps / with Sacha Labourey] | ||
+ | # [https://soundcloud.com/owasp-podcast/how-to-build-chapter-engagement-at-owasp How to Build Chapter Engagement at OWASP] | ||
+ | # [https://soundcloud.com/owasp-podcast/a-message-from-the-executive-producer A Message from the Executive Producer] | ||
+ | # [https://soundcloud.com/owasp-podcast/2018-appsec-eu-london-conference-preview 2018 AppSec EU London - Conference Preview] | ||
+ | # [https://soundcloud.com/owasp-podcast/steps-to-responsible-disclosure-with-bas-van-schaikman-yue-mo-and-brian-fox Steps to Responsible Disclosure with Bas van Schaik,Man Yue Mo and Brian Fox] | ||
+ | # [https://soundcloud.com/owasp-podcast/rsac-2018-preview-of-opening-session-for-devops-connect-devsecops-day RSAC 2018 - Preview of Opening Session for DevOps Connect: DevSecOps Day] | ||
+ | # [https://soundcloud.com/owasp-podcast/hacknyc-2018-preview-with-kevin-e-greene HackNYC 2018: Preview with Kevin E. Greene] | ||
+ | # [https://soundcloud.com/owasp-podcast/hacknyc-2018-preview-with-dr-bill-curtis HackNYC 2018: Preview with Dr. Bill Curtis] | ||
+ | # [https://soundcloud.com/owasp-podcast/the-openchain-project-with-shane-coughlan The OpenChain Project with Shane Coughlan] | ||
+ | # [http://www.sonatype.org/nexus/2017/11/30/expanding-community-engagement-at-owasp-w-greg-anderson-podcast/ Expanding Community Engagement at OWASP w/ Greg Anderson] | ||
+ | # [http://www.sonatype.org/nexus/2017/11/16/thoughts-on-security-in-the-modern-software-supply-chain-with-caroline-wong-and-paula-thrasher/ Thoughts on Security in the Modern Software Supply Chain with Caroline Wong and Paula Thrasher] | ||
+ | # [https://soundcloud.com/owasp-podcast/security-processes-at-the-apache-software-foundation-w-mark-thomas-and-brian-fox Security Processes at the Apache Software Foundation w/ Mark Thomas and Brian Fox] | ||
+ | # [https://soundcloud.com/owasp-podcast/struts2-vulnerabilities-who-is-responsible Struts2 Vulnerabilities: Who Is Responsible?] | ||
+ | # [https://soundcloud.com/owasp-podcast/what-you-should-know-about-the-latest-struts-2-vulnerability-announcement What you should know about the latest struts 2 vulnerability announcement] | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-hacker-kids-in-bangalore OWASP Hacker Kids in Bangalore] | ||
+ | # [https://soundcloud.com/owasp-podcast/less-than-10-minutes-series-owasp-dockerhub-with-simon-bennetts Less than 10 Minutes Series: OWASP DockerHub with Simon Bennetts] | ||
+ | # [https://soundcloud.com/owasp-podcast/less-than-10-minutes-series-core-rule-set-project Less than 10 Minutes Series - ModSecurity Core Rule Set Project] | ||
+ | # [https://soundcloud.com/owasp-podcast/less-than-10-minutes-series-owasp-summit-2017 Less than 10 Minutes Series: OWASP Summit 2017] | ||
+ | # [https://soundcloud.com/owasp-podcast/less-than-10-minutes-series-webgoat-project Less than 10 Minutes Series: WebGoat Project] | ||
+ | # [https://soundcloud.com/owasp-podcast/vicnum-project Less than 10 Minutes Series: Vicnum Project] | ||
+ | # [https://soundcloud.com/owasp-podcast/less-than-10-minutes-series-defect-dojo-project Less than 10 Minutes Series: Defect Dojo Project] | ||
+ | # [https://soundcloud.com/owasp-podcast/less-than-10-minutes-series-virtual-village-project Less than 10 Minutes Series: Virtual Village Project] | ||
+ | # [https://soundcloud.com/owasp-podcast/less-than-10-minutes-series-the-juice-shop-project Less than 10 Minutes Series: The Juice Shop Project] | ||
+ | # [https://soundcloud.com/owasp-podcast/appsec-eu-2017-belfast-keynote-preview-with-jaya-baloo AppSec EU 2017, Belfast Keynote Preview with Jaya Baloo] | ||
+ | # [https://soundcloud.com/owasp-podcast/struts-2-vulnerability-analysis Struts 2 Vulnerability Analysis] | ||
+ | # [https://soundcloud.com/owasp-podcast/appsec-eu-2017-belfast-what-to-expect AppSec EU 2017 Belfast - What to Expect] | ||
+ | # [https://soundcloud.com/owasp-podcast/culture-hacker-how-to-herd-catts-and-inspire-rebels-to-change-the-world Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World] | ||
+ | # [https://soundcloud.com/owasp-podcast/shannon-lietz-keynote-preview-for-appsec-eu-2017-belfast Shannon Lietz - Keynote Preview for AppSec EU 2017, Belfast] | ||
+ | # [http://www.sonatype.org/nexus/2016/11/30/2016-appsec-usa-an-update-on-the-webgoat-project/ 2016 AppSec USA – An Update on the WebGoat Project] | ||
+ | # [https://soundcloud.com/owasp-podcast/the-core-rule-set-project-w-chaim-sanders 2016 AppSec USA: The Core Rule Set Project w/ Chaim Sanders] | ||
+ | # [https://soundcloud.com/owasp-podcast/the-future-of-devsecops-w-shannon-lietz-and-chris-swann-live-from-ip-expo-london The Future of DevSecOps w/ Shannon Lietz and Chris Swan, Live From IP Expo London] | ||
+ | # [http://www.sonatype.org/nexus/2016/09/14/2016-owasp-board-election-interviews-part-one-of-four/ 2016 OWASP Board Election Interviews - Part One of Four - Developer Participation] | ||
+ | # [http://www.sonatype.org/nexus/2016/09/15/2016-owasp-board-election-interviews-part-two-of-four-vendor-neutrality/ 2016 OWASP Board Election Interviews – Part Two of Four – Vendor Neutrality] | ||
+ | # [http://www.sonatype.org/nexus/2016/09/18/2016-owasp-board-election-interviews-part-three-of-four-most-important-issues/ 2016 OWASP Board Election Interviews – Part Three of Four – Most Important Issues] <br /> | ||
+ | # [http://www.sonatype.org/nexus/2016/09/19/2016-board-election-interviews-part-four-of-four/ 2016 OWASP Board Election Interviews – Part Four of Four – Members, Projects, Conferences, Chapters] | ||
+ | # [http://www.sonatype.org/nexus/2016/09/09/appsec-usa-pre-conference-update/ AppSec USA 2016 Pre-Conference Update] | ||
+ | # [http://www.sonatype.org/nexus/2016/08/18/security-as-part-of-continuous-delivery-with-sacha-labourey/ Security as Part of Continuous Delivery with Sacha Labourey] | ||
+ | # [http://www.sonatype.org/nexus/2016/07/21/unicorns-on-an-aircraft-carrier-devops-security-at-scale-with-sanjeev-sharma/ Unicorns on an Aircraft Carrier: DevOps Security at Scale with Sanjeev Sharma] | ||
+ | # [http://www.sonatype.org/nexus/2016/07/11/2016-state-of-the-software-supply-chain-report-released/ 2016 State of the Software Supply Chain Report Released] <br /> | ||
+ | # [http://www.sonatype.org/nexus/2016/07/06/security-as-part-of-devops-and-development-with-jason-schmitt/ Security as Part of DevOps and Development with Jason Schmitt] | ||
+ | # [http://www.sonatype.org/nexus/2016/07/01/interviews-and-insights-from-appseceu-2016/ 2016 AppSecEU - Update On The ASVS Project with Andrew van der Stock] | ||
+ | # [http://www.sonatype.org/nexus/2016/07/01/interviews-and-insights-from-appseceu-2016/ 2016 AppSecEU - The University Challenge] | ||
+ | # [http://www.sonatype.org/nexus/2016/06/29/interview-with-mark-miller-sonatype-senior-storyteller-devops-evangelist/ Jim Manico's 100th Episode, featuring Mark Miller, Executive Producer of OWASP 24/7] | ||
+ | # [https://soundcloud.com/owasp-podcast/2016-appsec-europe-what-to-expect AppSec Europe 2016 - What To Expect]<br /> | ||
+ | # [http://www.sonatype.org/nexus/2016/04/01/communication-patterns-in-open-source-component-supply-chains/ Communication Patterns in Open Source Component Supply Chains] | ||
+ | # [http://www.trustedsoftwarealliance.com/2016/03/21/active-deception-as-a-methodology-for-cybersecurity-w-lawrence-pingree-from-gartner/ Active Deception as a Methodology for Cybersecurity w/ Lawrence Pingree from Gartner] | ||
+ | # [http://www.trustedsoftwarealliance.com/2016/03/10/security-war-games-with-sam-guckenheimer-at-rugged-devops-rsac-2016/ Security War Games with Sam Guckenheimer at Rugged DevOps RSAC 2016] | ||
+ | # [http://www.trustedsoftwarealliance.com/2016/03/02/devops-security-and-engineering-at-slack/ DevOps, Security and Engineering at Slack] | ||
+ | # [http://www.trustedsoftwarealliance.com/2016/02/26/guns-germs-and-steel-at-rsac-2016-with-john-willis/ Guns, Germs and Steel at RSAC 2016 with John Willis] <br /> | ||
+ | # [http://www.trustedsoftwarealliance.com/2016/02/25/equal-respect-women-in-technology-with-chenxi-wang-audio/ Equal Respect: Women in Technology with Chenxi Wang] | ||
+ | # [http://www.trustedsoftwarealliance.com/2016/02/24/devops-politics-people-and-process-with-paula-thrasher/ DevOps: Politics, People and Process with Paula Thrasher] | ||
+ | # [http://www.trustedsoftwarealliance.com/2016/02/09/owasp-top-10-proactive-controls-project-with-jim-manico-and-kay-anton/ OWASP Top 10 Proactive Controls Project with Jim Manico and Katy Anton] | ||
+ | # [http://www.trustedsoftwarealliance.com/2016/02/01/the-owasp-webgoat-project-version-7-0-with-bruce-mayhew-audio/ The OWASP WebGoat Project, version 7.0, with Bruce Mayhew] | ||
+ | # [http://www.trustedsoftwarealliance.com/2016/01/27/johanna-curiel-on-the-growing-pains-of-owasp-and-management-of-project-reviews/ Johanna Curiel on the Growing Pains of OWASP and Management of Project Reviews] <br /> | ||
+ | # [http://www.trustedsoftwarealliance.com/2016/01/21/2016-whats-in-store-for-the-owasp-247-podcast-series/ 2016 – What’s in Store for the OWASP 24/7 Podcast Series] | ||
+ | # [http://www.trustedsoftwarealliance.com/2015/11/25/owasp-shark-tank-could-you-convince-someone-to-invest-in-your-project/ OWASP Shark Tank - Could You Convince Someone to Invest in Your Project?] | ||
+ | # [http://www.trustedsoftwarealliance.com/2015/11/17/security-shepherd-project-w-mark-denihan-and-paul-mccann/ Security Shepherd Project w/ Mark Denihan and Paul McCann] | ||
+ | # [https://soundcloud.com/owasp-podcast/security-in-development-w-matt-tesauro-shannon-lietz-and-jez-humble DevOps, Security and Development w/ Matt Tesauro, Shannon Lietz and Jez Humble] | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-benchmark-project-w-dave-wichers OWASP Benchmark Project w/ Dave Wichers] <br /> | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-asvs-project-final OWASP Application Security Verification Standard Project w/ Andrew van der Stock] | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-board-interview-abbas-naderi-michael-coates-jonathan-carter OWASP Board Candidate Interview - Abbas Naderi, Michael Coates, Jonathan Carter] | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-board-interview-bil-corry-and-josh-sokol OWASP Board Candidate Interview - Bil Corry and Josh Sokol] | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-board-interview-milton-smith-tobias-gondrom-tom-brannen OWASP Board Candidate Interview - Milton Smith, Tobias Gondrom, Tom Brennan] | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-security-knowledge-framework-project-w-glenn-ten-cata OWASP Security Knowledge Framework Project w/ Glenn Ten Cate]<br /> | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-summerofcodesprint2015-final OWASP Summer of Code Sprint 2015 with Fabio Cerullo] | ||
+ | # [https://soundcloud.com/owasp-podcast/2015-owasp-project-funding-part-2-w-johanna-curiel-and-claudia-casanovas OWASP Project Funding Part 2 w/ Johanna Curiel and Claudia Casanovas] | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-project-funding OWASP Project Funding w/ Josh Sokol, Dinis Cruz and Andrew van der Stock] | ||
+ | # [https://soundcloud.com/owasp-podcast/the-owasp-online-academy-with-john-patrick-lita-and-jerry-hoff The OWASP Online Academy with John Patrick Lita and Jerry Hoff] | ||
+ | # [https://soundcloud.com/owasp-podcast/appsec-usa-2015-overview-with-ben-hagen-and-michael-coates AppSec USA 2015 Overview with Ben Hagen and Michael Coates]<br /> | ||
+ | # [https://soundcloud.com/owasp-podcast/paul-ritchie-executive-director-talks-present-past-and-future-of-owasp Paul Ritchie, Executive Director, Talks Present, Past and Future of OWASP] | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-offensive-web-testing-framework OWASP Offensive Web Testing Framework with Bharadwaj Machiraju and Abraham Aranguren] | ||
+ | # [https://soundcloud.com/owasp-podcast/tobias-gondrom-on-the-owasp-strategic-goals-for-2015 Tobias Gondrom on the OWASP Strategic Goals for 2015] | ||
+ | # [https://soundcloud.com/owasp-podcast/2015-appseceu-preconferenceupdate 2015 AppSecEU Pre Conference Update] | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-project-reviews-with-johanna-curiel OWASP Project Reviews with Johanna Curiel]<br /> | ||
+ | # [https://soundcloud.com/owasp-podcast/2015-owasp-project-summit-in-nyc-with-tom-brennan 2015 OWASP Project Summit in NYC with Tom Brennan] | ||
+ | # [https://soundcloud.com/owasp-podcast/seba-deleersnyder-discusses-samm-software-assurance-maturity-model-summit-in-dublin-ireland Seba Deleersnyder Discusses SAMM (Software Assurance Maturity Model) Summit in Dublin, Ireland] | ||
+ | # [https://soundcloud.com/owasp-podcast/2015-appsec-california-post-mortem-with-richard-greenberg-and-neil-matatall 2015 AppSec California Post Mortem with Richard Greenberg and Neil Matatall] | ||
+ | # [https://soundcloud.com/owasp-podcast/john-melton-and-the-owasp-appsensor-project John Melton and the OWASP AppSensor Project] | ||
+ | # [https://soundcloud.com/owasp-podcast/moxie-marlinspike-on-the-open-source-security-for-mobile-devices Moxie Marlinspike on Open Source Security for Mobile Devices]<br /> | ||
+ | # [https://soundcloud.com/owasp-podcast/dibbe-edwards-devops-and-open-source-at-ibm Dibbe Edwards - DevOps and Open Source at IBM] | ||
+ | # [https://soundcloud.com/owasp-podcast/the-webgoat-project-with The WebGoat Project with Rick Lawson and Jason White] | ||
+ | # [https://soundcloud.com/owasp-podcast/kevin-e-greene-on-owasp-and-the-swamp-project Kevin E. Greene on OWASP and the SWAMP Project] | ||
+ | # [https://soundcloud.com/owasp-podcast/appsec-usa-2014-denver-damon-edwards-matt-tesauro-eoin-keary-martin-knobloch AppSec USA 2014, Denver - Damon Edwards, Matt Tesauro, Eoin Keary, Martin Knobloch] | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-board-candidate-interviews-mateo-martinez OWASP Board Candidate Interviews - Mateo Martinez]<br /><br /> | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-board-candidate-interviews-jim-manico-timur-khrotko OWASP Board Candidate Interviews - Jim Manico, Timur Khrotko] | ||
+ | # [https://soundcloud.com/owasp-podcast/owaspboardcandidateinterviews-session02 OWASP Board Candidate Interviews - Andrew van der Stock, Nigel Phair, Abbas Naderi] | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-2014-boardcandidate-interviews-israel-bryski-matt-konda-bil-corry-and-tahir-khan OWASP 2014 Board Candidate Interviews - Israel Bryski, Matt Konda, Bil Corry and Tahir Khan] | ||
+ | # [https://soundcloud.com/owasp-podcast/2014-08-jonathancarter Jonathan Carter - OWASP and Mobile Security] | ||
+ | # [https://soundcloud.com/owasp-podcast/owasp-statement-on-the OWASP Statement on the Security of the Internet 2014]<br /><br /> | ||
+ | # [http://trustedsoftwarealliance.com/2014/07/29/sarah-baso-the-final-owasp-interview-audio/ Sarah Baso : The Final OWASP Interview] | ||
+ | # [http://trustedsoftwarealliance.com/2014/07/18/wait-wait-dont-pwn-me-from-appsec-europe-2014/ Wait! Wait! Don’t pwn me! from AppSec Europe 2014] | ||
+ | # [http://trustedsoftwarealliance.com/2014/07/14/eoin-keary-on-women-in-security-and-growing-an-owasp-chapter/ Eoin Keary on Women in Security and Growing an OWASP Chapter] | ||
+ | # [http://trustedsoftwarealliance.com/2014/07/01/achim-hoffman-and-the-o-saft-project-for-scanning-ssl-connections/ Achim Hoffmann and the o-Saft Project for Scanning SSL Connections] | ||
+ | # [http://trustedsoftwarealliance.com/2014/04/29/owasp-top-10-privacy-risks-project-with-florian-stahl-and-stefan-burgmair/ OWASP Top 10 Privacy Risks Project with Florian Stahl and Stefan Burgmair]<br /><br /> | ||
+ | # [http://trustedsoftwarealliance.com/2014/04/25/the-run-up-to-a-massive-cyber-security-month-with-tom-brennan/ The Run Up to a Massive Cyber Security Month with Tom Brennan] | ||
+ | # [http://trustedsoftwarealliance.com/2014/04/17/wolfgang-goerlich-on-a-real-world-example-of-the-phoenix-project-in-action/ Wolfgang Goerlich on a Real World Example of The Phoenix Project in Action] | ||
+ | # [http://trustedsoftwarealliance.com/2014/03/27/owasp-hacky-easter-challenge/ The OWASP Hacky Easter Challenge with Ivan Bütler] | ||
+ | # [https://soundcloud.com/owasp-podcast/dwayne-melancon-on-what Dwayne Melancon - What InfoSec Can Learn from Video Games] | ||
+ | # [http://trustedsoftwarealliance.com/2014/03/24/the-owasp-top-ten-proactive-controls-project-with-jim-bird/ The OWASP Top Ten Proactive Controls Project with Jim Bird]<br /><br /> | ||
+ | # [https://soundcloud.com/owasp-podcast/melissa-elliot-on-the Melissa Elliot on the HeartBleed Bug at Yahoo] | ||
+ | # [https://soundcloud.com/owasp-podcast/2014-appsec-apac-post-mortem 2014 AppSec APAC - Post Mortem (English)] | ||
+ | # [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ The OWASP Cornucopia Project with Colin Watson] | ||
+ | # [https://soundcloud.com/owasp-podcast/the-owasp-webspa-project-with The OWASP WebSpa Project with Yiannis Pavlosoglou and Jim Manico] | ||
+ | # [https://soundcloud.com/owasp-podcast/2014-appsec-apac-history-and 2014 AppSec APAC : History and Overview (Japanese and English)]<br /><br /> | ||
+ | # [http://trustedsoftwarealliance.com/2014/02/19/appsec-europe-2014-what-to-expect-with-host-adrian-winckles/ AppSec Europe 2014 : What To Expect with Host Adrian Winckles] | ||
+ | # [http://trustedsoftwarealliance.com/2014/02/18/appsec-usa-2013-mark-arnold-talks-about-the-boston-owasp-chapter/ AppSec USA 2013 : Mark Arnold Talks about the Boston OWASP Chapter] | ||
+ | # [http://trustedsoftwarealliance.com/2014/01/31/not-making-a-statement-is-a-statement-in-its-own-right-tobias-gondrom/ Not Making a Statement is a Statement in its Own Right] | ||
+ | # [http://trustedsoftwarealliance.com/2014/04/25/the-run-up-to-a-massive-cyber-security-month-with-tom-brennan/ National Security Awareness Month #NCSAM] | ||
+ | # [http://trustedsoftwarealliance.com/2014/01/14/appsec-apac-2014-with-tobias-gondrom-what-to-expect/ AppSec APAC 2014 with Tobias Gondrom - What to Expect]<br /><br /> | ||
+ | # [http://trustedsoftwarealliance.com/2014/01/13/appsec-usa-2013-larry-conklin-and-the-code-review-book-project/ AppSec USA 2013: Larry Conklin and the Code Review Book Project] | ||
+ | # [http://trustedsoftwarealliance.com/2014/01/07/jim-manico-life-after-owasp-podcasting/ AppSec USA 2013: Jim Manico - Life After OWASP Podcasting] | ||
+ | # [http://trustedsoftwarealliance.com/2013/12/13/appsec-usa-2013-zed-attack-proxy-project-with-simon-bennetts-interview/ AppSec USA 2013: Zed Attack Proxy Project with Simon Bennetts] | ||
+ | # [http://trustedsoftwarealliance.com/2013/12/19/appsec-usa-2013-abbas-naderi-and-the-owasp-php-security-project/ AppSec USA 2013: Abbas Naderi and the OWASP PHP Security Project)] | ||
+ | # [http://trustedsoftwarealliance.com/2013/12/10/appsec-usa-2013-michael-coates-on-the-appsensor-project/ AppSec USA 2013: Michael Coates on the AppSensor Project]<br /><br /> | ||
+ | # [http://trustedsoftwarealliance.com/2013/12/02/the-owasp-application-security-ciso-guide-with-marco-morana-and-tobias-gondrom/ The OWASP Application Security CISO Guide with Marco Morana and Tobias Gondrom] | ||
+ | # [http://trustedsoftwarealliance.com/2013/11/27/the-purpose-of-owasp-an-interview-with-co-founder-dennis-groves/ The Purpose of OWASP, an Interview with Co-Founder Dennis Groves] | ||
+ | # [http://www.trustedsoftwarealliance.com/2013/11/25/wait-wait-dont-pwn-me-full-recording-from-appsec-usa-2013/ Wait! Wait! Don't pwn me! - Full recording from AppSec USA 2013] | ||
+ | # [https://soundcloud.com/owasp-podcast/sarah-baso-43-000-members-160 Sarah Baso - What does it take to support 43,000 members in 100+ countries?] | ||
+ | # [https://soundcloud.com/owasp-podcast/samantha-groves-owasp-projects Samantha Groves - Getting the Most from OWASP Projects]<br /><br /> | ||
+ | # [https://soundcloud.com/owasp-podcast/kate-hartmann-the-future-of Kate Hartmann - The Future of Virtual Chapter Meetings] | ||
+ | # [https://soundcloud.com/owasp-podcast/kelly-santalucia-growing-owasp Kelly Santalucia - Growing OWASP and the Outreach Programs] | ||
+ | # [https://soundcloud.com/owasp-podcast/tom-brennan-what-to-expect-at Tom Brennan - What to Expect at AppSecUSA 2013] | ||
+ | # [https://soundcloud.com/owasp-podcast/appsec-usa-2013-owasp-panel-on AppSec USA 2013 - OWASP Panel on Using Components with Known Vulnerabilities] | ||
+ | |||
+ | ''' Syndication ''' | ||
+ | |||
+ | RSS feed is available here: [http://feeds.soundcloud.com/users/soundcloud:users:63303345/sounds.rss https://www.owasp.org/images/d/d3/Feed-icon-32x32.png] | ||
+ | |||
+ | [https://itunes.apple.com/ca/podcast/owasp-24-7/id300769012 iTunes feed here] | ||
+ | |||
+ | As of November 14, 2019, we have had 409,507 plays in total | ||
+ | |||
+ | As of May 26, 2019, we have had 366,768 plays in total | ||
+ | |||
+ | As of August 29, 2017, we had over 221,000+ plays of the broadcast. | ||
+ | |||
+ | As of July 7, 2016, we had over 151,000+ plays of the broadcast. | ||
+ | |||
+ | As of March 21, 2016, we had over 133,500+ plays of the broadcast.<br /> | ||
As of February 25, 2016, we had over 127,000+ plays of the broadcast.<br /> | As of February 25, 2016, we had over 127,000+ plays of the broadcast.<br /> | ||
As of January 22, 2016, we had over 120,000+ plays of the broadcast.<br /> | As of January 22, 2016, we had over 120,000+ plays of the broadcast.<br /> | ||
Line 12: | Line 181: | ||
As of September 3, 2015, we had over 102,500+ plays of the broadcast.<br /> | As of September 3, 2015, we had over 102,500+ plays of the broadcast.<br /> | ||
As of July 31, 2015, we had over 98,800+ plays of the broadcast.<br /> | As of July 31, 2015, we had over 98,800+ plays of the broadcast.<br /> | ||
− | As of June 29, 2015, we had over 92,000+ plays of the broadcast.<br /> | + | As of June 29, 2015, we had over 92,000+ plays of the broadcast.<br /> |
Thanks for your continuing support. | Thanks for your continuing support. | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
= Original Series with Jim Manico = | = Original Series with Jim Manico = | ||
Line 109: | Line 192: | ||
* Listen as Jim interviews OWASP volunteers, industry experts and leaders within the field of web application security. | * Listen as Jim interviews OWASP volunteers, industry experts and leaders within the field of web application security. | ||
* Questions? Comments? Please email [mailto:[email protected] [email protected]] | * Questions? Comments? Please email [mailto:[email protected] [email protected]] | ||
− | * Care to join our email list? Sign up here | + | * Care to join our email list? Sign up here https://lists.owasp.org/mailman/listinfo/owasp-podcast |
* Want to see the process and equipment behind the show? [https://www.owasp.org/index.php/Talk:OWASP_Podcast click here] | * Want to see the process and equipment behind the show? [https://www.owasp.org/index.php/Talk:OWASP_Podcast click here] | ||
<table border="0"><tr><td> | <table border="0"><tr><td> | ||
<td align="left" width="150"> | <td align="left" width="150"> | ||
− | Subscribe<br/>[http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=300769012 https://www.owasp.org/download/jmanico/itunes.jpg] [https://www.owasp.org/download/jmanico/podcast.xml https://www.owasp.org/images/d/d3/Feed-icon-32x32.png] | + | Subscribe<br />[http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=300769012 https://www.owasp.org/download/jmanico/itunes.jpg] [https://www.owasp.org/download/jmanico/podcast.xml https://www.owasp.org/images/d/d3/Feed-icon-32x32.png] |
</td> | </td> | ||
<td align="left"><paypal>OWASP Podcast</paypal></td> | <td align="left"><paypal>OWASP Podcast</paypal></td> | ||
Line 121: | Line 204: | ||
<table class="wikitable" border="1"> | <table class="wikitable" border="1"> | ||
− | |||
<tr> | <tr> | ||
Line 131: | Line 213: | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">98</td> |
− | <td | + | <td nowrap="" valign="TOP">March 3, 2014</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://api.soundcloud.com/tracks/137745520/download?client_id=b45b1aa10f1ac2941910a7f0d10f8e28 Listen Now]</td> |
− | <td | + | <td valign="TOP">Yiannis Pavlosoglou discussing The OWASP WebSpa Project. [https://soundcloud.com/owasp-podcast/the-owasp-webspa-project-with More info on SoundCloud].</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">97</td> |
− | <td | + | <td nowrap="" valign="TOP">November 2, 2013</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_97.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Les Hazlewood discussing Apache SHIRO</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">96</td> |
− | <td | + | <td nowrap="" valign="TOP">November 2, 2013</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_96.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Nabil Hannan discussing BSIMM</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">95</td> |
− | <td | + | <td nowrap="" valign="TOP">June 13, 2013</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_95.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Professor [http://www.secappdev.org/content_items/12 Daniel J. Bernstein] (Crypto Worst Practices) You can also [http://secappdev.org/lectures/144 watch] or [http://www.secappdev.org/handouts/2012/Dan%20J.%20Bernstein/worst%20practices.pdf obtain the slides] for this lecture</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">94</td> |
− | <td | + | <td nowrap="" valign="TOP">February 18, 2013</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_94.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Professor [http://secappdev.org/pages/3 Bart Preneel] (Crypto Basics) You can also [http://secappdev.org/lectures/115 watch] or [http://secappdev.org/handouts/2012/Bart%20Preneel/preneel_cryptographic_algorithms_2012.pdf obtain the slides] for this lecture</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">93</td> |
− | <td | + | <td nowrap="" valign="TOP">September 30, 2012</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_93.mp3 Listen Now] | [[OWASP_Podcast/Transcripts/093|Show Transcript]]</td> |
− | <td | + | <td valign="TOP">Professor [http://secappdev.org/pages/31 Frank Piessens] You can also [http://secappdev.org/lectures/148 watch] or [http://secappdev.org/handouts/2012/Frank%20Piessens/keynote.pdf obtain the slides] for this lecture</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">92</td> |
− | <td | + | <td nowrap="" valign="TOP">June 19, 2012</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_92.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">[http://www.appsecresearch.org/ AppSec Research 2012 Team]</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">91</td> |
− | <td | + | <td nowrap="" valign="TOP">May 3, 2012</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_91.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Troy Hunt (.NET Security)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">90</td> |
− | <td | + | <td nowrap="" valign="TOP">February 17, 2012</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_90.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Raul Siles ([https://www.owasp.org/index.php/Session_Management_Cheat_Sheet Session Management Cheat Sheet] )</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">89</td> |
− | <td | + | <td nowrap="" valign="TOP">November 28, 2011</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_89.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Jack Mannino and Joey Peloquin (Mobile)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">88</td> |
− | <td | + | <td nowrap="" valign="TOP">September 19, 2011</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_88.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Jason Li (Global Projects Committee)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">87</td> |
− | <td | + | <td nowrap="" valign="TOP">July 20, 2011</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_87.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">John Heimann (Oracle)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">**</td> |
− | <td | + | <td nowrap="" valign="TOP">July 16, 2011</td> |
− | <td | + | <td nowrap="" valign="TOP">[http://www.appsecusa.org/owasp_foundation_2011_board_candidate_interviews.mp3 Listen Now] </td> |
− | <td | + | <td valign="TOP">Dave Wichers, Sebastien Deleersnyder, Michael Coates, Christian Heinrich ([https://www.owasp.org/index.php/Membership/2011Election 2012 OWASP Election Candidates]) </td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">86</td> |
− | <td | + | <td nowrap="" valign="TOP">July 7, 2011</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_86.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Kevin Mahaffey, Jack Mannino and Chris Wysopal (Mobile Security)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">85</td> |
− | <td | + | <td nowrap="" valign="TOP">June 22, 2011</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_85.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Ken van Wyk (iGoat)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">84</td> |
− | <td | + | <td nowrap="" valign="TOP">May 10, 2011</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_84.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Alex Behar (DDoS Mitigation)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">83</td> |
− | <td | + | <td nowrap="" valign="TOP">March 19, 2011</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_83.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">[[User:Owaspdavef|Dave Ferguson]] (Forgot Password)</td> |
</tr> | </tr> | ||
− | |||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">82</td> |
− | <td | + | <td nowrap="" valign="TOP">February 7, 2011</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_82.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">[[User:Wichers|Dave Wichers]] [[OWASP_Board_Meetings | (OWASP Board Member)]]</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">81</td> |
− | <td | + | <td nowrap="" valign="TOP">January 8, 2011</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_81.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Brian Chess (Non-SaaS Static Analysis)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">80</td> |
− | <td | + | <td nowrap="" valign="TOP">December 11, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_80.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Chris Wysopal (SaaS Static Analysis)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">79</td> |
− | <td | + | <td nowrap="" valign="TOP">November 27, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_79.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Tony UV (Threat Modeling)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">78</td> |
− | <td | + | <td nowrap="" valign="TOP">October 13, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_78.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">AppSec Roundtable with Jeff Williams, Andrew van der Stock, Tom Brennan, Samy, Jeremiah Grossman and Jim Manico (Complete Chaos)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">77</td> |
− | <td | + | <td nowrap="" valign="TOP">October 13, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_77.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Rafal Los</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">76</td> |
− | <td | + | <td nowrap="" valign="TOP">September 22, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_76.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Bill Cheswick (Account Lockout)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">75</td> |
− | <td | + | <td nowrap="" valign="TOP">September 15, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_75.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Brandon Sterne (Content Security Policy)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">74</td> |
− | <td | + | <td nowrap="" valign="TOP">September 2, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_74.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Eoin Keary (Code Review)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">73</td> |
− | <td | + | <td nowrap="" valign="TOP">June 30, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_73.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Jeremiah Grossman and Robert Hansen</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">72</td> |
− | <td | + | <td nowrap="" valign="TOP">June 25, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_72.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with Ivan Ristic (WAF)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">71</td> |
− | <td | + | <td nowrap="" valign="TOP">April 19, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_71.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">[[Top_10_2010|Top Ten]] with Robert Hansen [[Top_10_2010-A10|(Redirects)]]</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">70</td> |
− | <td | + | <td nowrap="" valign="TOP">April 19, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_70.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">[[Top_10_2010|Top Ten]] with Michael Coates [[Top_10_2010-A9|(TLS)]]</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">69</td> |
− | <td | + | <td nowrap="" valign="TOP">April 19, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_69.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">[[Top_10_2010|Top Ten]] with Eric Sheridan [[Top_10_2010-A5|(CSRF)]]</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">68</td> |
− | <td | + | <td nowrap="" valign="TOP">April 19, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_68.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">[[Top_10_2010|Top Ten]] with Kevin Kenan [[Top_10_2010-A7|(Cryptographic Storage)]]</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">67</td> |
− | <td | + | <td nowrap="" valign="TOP">April 19, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_67.mp3 Listen Now] | [[OWASP_Podcast/Transcripts/067|Show Transcript]]</td> |
− | <td | + | <td valign="TOP">[[Top_10_2010|Top Ten]] with Jeff Williams [[Top_10_2010-A2|(XSS)]]</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">66</td> |
− | <td | + | <td nowrap="" valign="TOP">April 14, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_66.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with Brad Arkin (Adobe)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">65</td> |
− | <td | + | <td nowrap="" valign="TOP">April 13, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_65.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">AppSec Roundtable with Boaz Gelbord, Dan Cornell, Jeff Williams, Johannes Ullrich and Jim Manico (File Upload)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">64</td> |
− | <td | + | <td nowrap="" valign="TOP">March 30, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_64.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with Andy Ellis (Availability)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">63</td> |
− | <td | + | <td nowrap="" valign="TOP">March 17, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_63.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with Ed Bellis (eCommerce)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">62</td> |
− | <td | + | <td nowrap="" valign="TOP">March 12, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_62.mp3 Listen Now] | [[Podcast_62|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Amichai Shulman (WAF)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">61</td> |
− | <td | + | <td nowrap="" valign="TOP">March 10, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_61.mp3 Listen Now] | [[Podcast_61|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Richard Bejtlich (Network Monitoring)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">60</td> |
− | <td | + | <td nowrap="" valign="TOP">February 5, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_60.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with Jeremiah Grossman and Robert Hansen (Google pays for vulns)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">59</td> |
− | <td | + | <td nowrap="" valign="TOP">February 3, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_59.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">AppSec Roundtable with Boaz Gelbord, Ben Tomhave, Dan Cornell, Jeff Williams, Andrew van der Stock and Jim Manico (Aurora+)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">58</td> |
− | <td | + | <td nowrap="" valign="TOP">February 2, 2010</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_58.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with Ron Gula (Web Server Scanning, IDS/IPS)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">57</td> |
− | <td | + | <td nowrap="" valign="TOP">December 21, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_57.mp3 Listen Now] | [[Podcast_57|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with David Linthicum (Cloud Computing)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">56</td> |
− | <td | + | <td nowrap="" valign="TOP">December 7, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_56.mp3 Listen Now] | [[Podcast_56|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Adar Weidman (Regular Expression DOS)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">55</td> |
− | <td | + | <td nowrap="" valign="TOP">November 26, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_55.mp3 Listen Now] | [[Podcast_55|Show Notes]]</td> |
− | <td | + | <td valign="TOP">AppSec Roundtable with Boaz Gelbord, Jason Lam, Jim Manico and Jeff Williams (AppSec Justification)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">54</td> |
− | <td | + | <td nowrap="" valign="TOP">November 24, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_54.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with George Hesse (German Chapter Leader)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">53</td> |
− | <td | + | <td nowrap="" valign="TOP">November 24, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_53.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with Amichai Shulman (WAF)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">52</td> |
− | <td | + | <td nowrap="" valign="TOP">November 5, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_52.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Sandro Gauci ([http://code.google.com/p/waffit/ wafw00f])</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">51</td> |
− | <td | + | <td nowrap="" valign="TOP">October 30, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 Listen Now] | [[OWASP_Podcast/Transcripts/051|Show Transcript]]</td> |
− | <td | + | <td valign="TOP">Interview with Michael Coates (Real Time Defenses, [http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor])</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">50</td> |
− | <td | + | <td nowrap="" valign="TOP">October 30, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_50.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with Eldad Chai (Business Logic Attacks)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">49</td> |
− | <td | + | <td nowrap="" valign="TOP">October 30, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_49.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with Andre Riancho (OWASP w3af)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">48</td> |
− | <td | + | <td nowrap="" valign="TOP">October 30, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_48.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with Giorgio Fedon (Browser Security in Banking)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">47</td> |
− | <td | + | <td nowrap="" valign="TOP">October 23, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_47.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with Erlend Oftedal (Agile)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">46</td> |
− | <td | + | <td nowrap="" valign="TOP">October 23, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_46.mp3 Listen Now]</td> |
− | <td | + | <td valign="TOP">Interview with Luca Carettoni and Stefano Di Paola (HTTP Parameter Pollution)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">45</td> |
− | <td | + | <td nowrap="" valign="TOP">October 16, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_45.mp3 Listen Now] | [[Podcast_45|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Buanzo ([http://www.buanzo.com.ar/pro/eng.html Enigform] )</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">44</td> |
− | <td | + | <td nowrap="" valign="TOP">October 8, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_44.mp3 Listen Now] | [[Podcast_44|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Andy Steingruebl (PayPal Secure Development Manager)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">43</td> |
− | <td | + | <td nowrap="" valign="TOP">October 2, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_43.mp3 Listen Now] | [[Podcast_43|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Mike Smith (http://www.guerilla-ciso.com/)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">42</td> |
− | <td | + | <td nowrap="" valign="TOP">October 1, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_42.mp3 Listen Now] | [[Podcast_42|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Roundtable with Matt Fisher, Jim Manico, Dan Philpott, Jack Whitsitt and Doug Wilson (FISMA, US Federal Cybersecurity)</td> |
</tr> | </tr> | ||
− | |||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">41</td> |
− | <td | + | <td nowrap="" valign="TOP">September 26, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_41.mp3 Listen Now] | [[Podcast_41|Show Notes]] | [[OWASP_Podcast/Transcripts/041|Show Transcript]]</td> |
− | <td | + | <td valign="TOP">Interview with David Rice (Author of Geekonomics)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">40</td> |
− | <td | + | <td nowrap="" valign="TOP">September 23, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_40.mp3 Listen Now] | [[Podcast_40|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Rohit Sethi (OWASP J2EE Pattern Project)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">39</td> |
− | <td | + | <td nowrap="" valign="TOP">August 25, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_39.mp3 Listen Now] | [[Podcast_39|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Gunnar Peterson (Webservices)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">38</td> |
− | <td | + | <td nowrap="" valign="TOP">August 25, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_38.mp3 Listen Now] | [[Podcast_38|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with the OWASP Global Education Committee</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">37</td> |
− | <td | + | <td nowrap="" valign="TOP">August 22, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_37.mp3 Listen Now] | [[Podcast_37|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Jason Lam and Johannes Ullrich (SANS Institute)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">36</td> |
− | <td | + | <td nowrap="" valign="TOP">August 15, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_36.mp3 Listen Now] | [[Podcast_36|Show Notes]]</td> |
− | <td | + | <td valign="TOP">May 2009 News Commentary Recorded July 23 with Boaz Gelbord, Andre Gironda, Jason Lam, Jim Manico, Alex Smolen, Ben Tomhave, Andrew van der Stock and Jeff Williams (part 2)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">35</td> |
− | <td | + | <td nowrap="" valign="TOP">August 4, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_35.mp3 Listen Now] | [[Podcast_35|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Anton Chuvakin, Ph.D (PCI)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">34</td> |
− | <td | + | <td nowrap="" valign="TOP">July 30, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_34.mp3 Listen Now] | [[Podcast_34|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Amichai Shulman (WAF)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">33</td> |
− | <td | + | <td nowrap="" valign="TOP">July 25, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_33.mp3 Listen Now] | [[Podcast_33|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Paolo Perego (OWASP Orizon)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">32</td> |
− | <td | + | <td nowrap="" valign="TOP">July 21, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_32.mp3 Listen Now] | [[Podcast_32|Show Notes]]</td> |
− | <td | + | <td valign="TOP">May 2009 News Commentary Recorded June 11 with Arshan Dabirsiaghi, Boaz Gelbord, Jim Manico, Andrew van der Stock and Jeff Williams (part 1)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">31</td> |
− | <td | + | <td nowrap="" valign="TOP">July 4, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_31.mp3 Listen Now] | [[Podcast_31|Show Notes]] | [[OWASP_Podcast/Transcripts/031|Show Transcript]]</td> |
− | <td | + | <td valign="TOP">Interview with Mark Curphey (OWASP Founder)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">30</td> |
− | <td | + | <td nowrap="" valign="TOP">July 2, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_30.mp3 Listen Now] | [[Podcast_30|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Billy Hoffman and Matt Wood (HP Application Security Research)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">29</td> |
− | <td | + | <td nowrap="" valign="TOP">June 30, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_29.mp3 Listen Now] | [[Podcast_29|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Justin Clarke (SQL Injection)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">28</td> |
− | <td | + | <td nowrap="" valign="TOP">June 26, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_28.mp3 Listen Now] | [[Podcast_28|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Ross J. Anderson</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">27</td> |
− | <td | + | <td nowrap="" valign="TOP">June 26, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_27.mp3 Listen Now] | [[Podcast_27|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Rafal Los (The Skeletor of AppSec)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">26</td> |
− | <td | + | <td nowrap="" valign="TOP">June 17, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_26.mp3 Listen Now] | [[Podcast_26|Show Notes]]</td> |
− | <td | + | <td valign="TOP">April 2009 News Commentary Recorded May 28 with Tom Brennan, Andre Gironda, Jim Manico, Alex Smolen and Jeff Williams (part 2)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">25</td> |
− | <td | + | <td nowrap="" valign="TOP">June 15, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_25.mp3 Listen Now] | [[Podcast_25|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with James McGovern</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">24</td> |
− | <td | + | <td nowrap="" valign="TOP">June 12, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_24.mp3 Listen Now] | [[Podcast_24|Show Notes]]</td> |
− | <td | + | <td valign="TOP">April 2009 News Commentary Recorded May 14 with Andre Gironda, Jim Manico, Alex Smolen and Jeff Williams (part 1)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">23</td> |
− | <td | + | <td nowrap="" valign="TOP">June 1, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_23.mp3 Listen Now] | [[Podcast_23|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Dr. Boaz Gelbord</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">22</td> |
− | <td | + | <td nowrap="" valign="TOP">May 22, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_22.mp3 Listen Now] | [[Podcast_22|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Dan Cornell (Membership Committee)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">21</td> |
− | <td | + | <td nowrap="" valign="TOP">May 20, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_21.ogg Listen Now] | [[Podcast_21|Show Notes]] | [[OWASP_Podcast/Transcripts/021|Show Transcript]]</td> |
− | <td | + | <td valign="TOP">Interview with Richard Stallman</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">20</td> |
− | <td | + | <td nowrap="" valign="TOP">May 13, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_20.mp3 Listen Now] | [[Podcast_20|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Mike Bailey</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">19</td> |
− | <td | + | <td nowrap="" valign="TOP">May 11, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_19.mp3 Listen Now] | [[Podcast_19|Show Notes]]</td> |
− | <td | + | <td valign="TOP">March 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 2)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">18</td> |
− | <td | + | <td nowrap="" valign="TOP">April 30, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_18.mp3 Listen Now] | [[Podcast_18|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Jeremiah Grossman</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">17</td> |
− | <td | + | <td nowrap="" valign="TOP">April 21, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_17.mp3 Listen Now] | [[Podcast_17|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Robert Hansen</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">16</td> |
− | <td | + | <td nowrap="" valign="TOP">April 9, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_16.mp3 Listen Now] | [[Podcast_16|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Dave Aitel (Demonstrates Cool)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">15</td> |
− | <td | + | <td nowrap="" valign="TOP">April 4, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_15.mp3 Listen Now] | [[Podcast_15|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Brian Chess (BSIMM)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">14</td> |
− | <td | + | <td nowrap="" valign="TOP">March 25, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_14.mp3 Listen Now] | [[Podcast_14|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Pravir Chandra (OWASP SAMM)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">13</td> |
− | <td | + | <td nowrap="" valign="TOP">March 23, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_13.mp3 Listen Now] | [[Podcast_13|Show Notes]]</td> |
− | <td | + | <td valign="TOP">March 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 1)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">12</td> |
− | <td | + | <td nowrap="" valign="TOP">March 11, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_12.mp3 Listen Now] | [[Podcast_12|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Ryan Barnett (OWASP ModSecurity Core Ruleset)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">11</td> |
− | <td | + | <td nowrap="" valign="TOP">March 4, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_11.mp3 Listen Now] | [[Podcast_11|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with MITRE (Steve Christey and Bob Martin)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">10</td> |
− | <td | + | <td nowrap="" valign="TOP">February 26, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_10.mp3 Listen Now] | [[Podcast_10|Show Notes]] | [[OWASP_Podcast/Transcripts/010|Show Transcript]]</td> |
− | <td | + | <td valign="TOP">Interview with Ken van Wyk</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">9</td> |
− | <td | + | <td nowrap="" valign="TOP">February 20, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_9.mp3 Listen Now] | [[Podcast_9|Show Notes]]</td> |
− | <td | + | <td valign="TOP">February 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 2)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">8</td> |
− | <td | + | <td nowrap="" valign="TOP">February 20, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_8.mp3 Listen Now] | [[Podcast_8|Show Notes]]</td> |
− | <td | + | <td valign="TOP">February 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 1)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">7</td> |
− | <td | + | <td nowrap="" valign="TOP">January 30, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_7.mp3 Listen Now] | [[Podcast_7|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Jeff Williams</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">6</td> |
− | <td | + | <td nowrap="" valign="TOP">January 24, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_6.mp3 Listen Now] | [[Podcast_6|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Roundtable with Andre Gironda, Brian Holyfield, Jim Manico, Marcin Wielgoszewski</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">5</td> |
− | <td | + | <td nowrap="" valign="TOP">January 15, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_5.mp3 Listen Now] | [[Podcast_5|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Gary McGraw</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">4</td> |
− | <td | + | <td nowrap="" valign="TOP">January 13, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_4.mp3 Listen Now] | [[Podcast_4|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Andrew van der Stock (OWASP Developers Guide)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">3</td> |
− | <td | + | <td nowrap="" valign="TOP">December 30, 2009</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_3.mp3 Listen Now] | [[Podcast_3|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Matt Tesauro (OWASP Live CD)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">2</td> |
− | <td | + | <td nowrap="" valign="TOP">December 20, 2008</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_2.mp3 Listen Now] | [[Podcast_2|Show Notes]]</td> |
− | <td | + | <td valign="TOP">Interview with Stephen Craig Evans (OWASP WebGoat/ModSecurity Project)</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td nowrap="" valign="TOP">1</td> |
− | <td | + | <td nowrap="" valign="TOP">November 21, 2008</td> |
− | <td | + | <td nowrap="" valign="TOP">[https://www.owasp.org/download/jmanico/owasp_podcast_1.mp3 Listen Now] | [[Podcast_1|Show Notes]]</td> |
− | <td | + | <td valign="TOP">News Commentary by Arshan Dabirsiaghi, Jeremiah Grossman, Jim Manico and Jeff Williams</td> |
</tr> | </tr> | ||
Line 855: | Line 935: | ||
'''Host and Executive Producer''' | '''Host and Executive Producer''' | ||
* [[User:markmiller|Mark Miller]] | * [[User:markmiller|Mark Miller]] | ||
+ | |||
+ | '''Guest Podcasters and contributors''' | ||
+ | * [[User:brennan|Tom Brennan]] | ||
'''Artwork''' | '''Artwork''' | ||
Line 863: | Line 946: | ||
* The OWASP Foundation | * The OWASP Foundation | ||
* [http://www.sonatype.com/ Sonatype] | * [http://www.sonatype.com/ Sonatype] | ||
− | * [http://www.proactiverisk.com/ | + | * [http://www.proactiverisk.com/ CATScan® from ProactiveRISK] |
= Artwork = | = Artwork = | ||
Line 887: | Line 970: | ||
__NOTOC__ | __NOTOC__ | ||
− | <headertabs/> | + | <headertabs></headertabs> |
Latest revision as of 19:21, 14 November 2019
The DevSecOps Podcast is series of recorded broadcasts, highlighting OWASP projects and chapters, and DevSecOps practitioners from around the world. The DevSecOps Podcast is available on demand, at anytime, anywhere on the planet. You are welcome to embed the broadcasts on your page, download them for your personal listening or keep up to date by subscribing to the SoundCloud Channel.
Listen to All Available Broadcasts or choose a single episode below
- How to Engage 4000 Developers in One Day
- Code Rush, DevOps and Google: Software in the Fast Lane
- The Unicorn Project w/ Gene Kim
- DevOps, DevSecOps and the Year Ahead w/ Sacha Labourey
- Is it time to trust Equifax again? You decide.
- 2019 Global AppSec Conference, DC
- State of the Software Supply Chain Report
- The Vanity of Diversity w/ Loni Rosales
- Create and Manage Internal Tech Conferences
- Securing the Software Supply Chain - Live Panel for International Conference on Cyber Engagement
- Tel Aviv and the 2019 Global AppSec Conference
- Perspectives on the "Sec" in DevSecOps w/ Tanya Janca
- 2019 Open Security Summit Preview
- What is an SBOM and Why Should You Care? w/ Allan Friedman
- What is Chaos Engineering, an Interview with Casey Rosenthal
- Ladies of London Hacking Society w/ Eliza-May Austin
- Anticipating Failure through Threat Modeling w/ Adam Shostack
- We Are All Special Snowflakes with Chris Roberts
- A Concise Introduction to DevSecOps
- What's In Store for the AppSec Cali Conference w/ Richard Greenberg
- Epic Failures in DevSecOps w/ Aubrey Stearn
- Strategic Asymetry - Leveling the Playing Field w/ Chetan Conikee
- Threat Modeling - A Disaster Story with Edwin Kwan
- The DevSecOps Unicorn Rodeo w/ Stefan Streichsbier
- The DevSecOps Experiment with DJ Schleen
- Open Source Vulnerabilities - Who is Ultimately Responsible
- event-stream: Analysis of a Compromised npm Package
- Spy vs Spy in Application Security: Harvesting Adversaries
- Moving from Projects to Products w/ Mik Kersten
- The Journey to Open Source at Capital One w/ Tapabrata "Topo" Pal
- The Future of Software and DevOps / with Sacha Labourey
- How to Build Chapter Engagement at OWASP
- A Message from the Executive Producer
- 2018 AppSec EU London - Conference Preview
- Steps to Responsible Disclosure with Bas van Schaik,Man Yue Mo and Brian Fox
- RSAC 2018 - Preview of Opening Session for DevOps Connect: DevSecOps Day
- HackNYC 2018: Preview with Kevin E. Greene
- HackNYC 2018: Preview with Dr. Bill Curtis
- The OpenChain Project with Shane Coughlan
- Expanding Community Engagement at OWASP w/ Greg Anderson
- Thoughts on Security in the Modern Software Supply Chain with Caroline Wong and Paula Thrasher
- Security Processes at the Apache Software Foundation w/ Mark Thomas and Brian Fox
- Struts2 Vulnerabilities: Who Is Responsible?
- What you should know about the latest struts 2 vulnerability announcement
- OWASP Hacker Kids in Bangalore
- Less than 10 Minutes Series: OWASP DockerHub with Simon Bennetts
- Less than 10 Minutes Series - ModSecurity Core Rule Set Project
- Less than 10 Minutes Series: OWASP Summit 2017
- Less than 10 Minutes Series: WebGoat Project
- Less than 10 Minutes Series: Vicnum Project
- Less than 10 Minutes Series: Defect Dojo Project
- Less than 10 Minutes Series: Virtual Village Project
- Less than 10 Minutes Series: The Juice Shop Project
- AppSec EU 2017, Belfast Keynote Preview with Jaya Baloo
- Struts 2 Vulnerability Analysis
- AppSec EU 2017 Belfast - What to Expect
- Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World
- Shannon Lietz - Keynote Preview for AppSec EU 2017, Belfast
- 2016 AppSec USA – An Update on the WebGoat Project
- 2016 AppSec USA: The Core Rule Set Project w/ Chaim Sanders
- The Future of DevSecOps w/ Shannon Lietz and Chris Swan, Live From IP Expo London
- 2016 OWASP Board Election Interviews - Part One of Four - Developer Participation
- 2016 OWASP Board Election Interviews – Part Two of Four – Vendor Neutrality
- 2016 OWASP Board Election Interviews – Part Three of Four – Most Important Issues
- 2016 OWASP Board Election Interviews – Part Four of Four – Members, Projects, Conferences, Chapters
- AppSec USA 2016 Pre-Conference Update
- Security as Part of Continuous Delivery with Sacha Labourey
- Unicorns on an Aircraft Carrier: DevOps Security at Scale with Sanjeev Sharma
- 2016 State of the Software Supply Chain Report Released
- Security as Part of DevOps and Development with Jason Schmitt
- 2016 AppSecEU - Update On The ASVS Project with Andrew van der Stock
- 2016 AppSecEU - The University Challenge
- Jim Manico's 100th Episode, featuring Mark Miller, Executive Producer of OWASP 24/7
- AppSec Europe 2016 - What To Expect
- Communication Patterns in Open Source Component Supply Chains
- Active Deception as a Methodology for Cybersecurity w/ Lawrence Pingree from Gartner
- Security War Games with Sam Guckenheimer at Rugged DevOps RSAC 2016
- DevOps, Security and Engineering at Slack
- Guns, Germs and Steel at RSAC 2016 with John Willis
- Equal Respect: Women in Technology with Chenxi Wang
- DevOps: Politics, People and Process with Paula Thrasher
- OWASP Top 10 Proactive Controls Project with Jim Manico and Katy Anton
- The OWASP WebGoat Project, version 7.0, with Bruce Mayhew
- Johanna Curiel on the Growing Pains of OWASP and Management of Project Reviews
- 2016 – What’s in Store for the OWASP 24/7 Podcast Series
- OWASP Shark Tank - Could You Convince Someone to Invest in Your Project?
- Security Shepherd Project w/ Mark Denihan and Paul McCann
- DevOps, Security and Development w/ Matt Tesauro, Shannon Lietz and Jez Humble
- OWASP Benchmark Project w/ Dave Wichers
- OWASP Application Security Verification Standard Project w/ Andrew van der Stock
- OWASP Board Candidate Interview - Abbas Naderi, Michael Coates, Jonathan Carter
- OWASP Board Candidate Interview - Bil Corry and Josh Sokol
- OWASP Board Candidate Interview - Milton Smith, Tobias Gondrom, Tom Brennan
- OWASP Security Knowledge Framework Project w/ Glenn Ten Cate
- OWASP Summer of Code Sprint 2015 with Fabio Cerullo
- OWASP Project Funding Part 2 w/ Johanna Curiel and Claudia Casanovas
- OWASP Project Funding w/ Josh Sokol, Dinis Cruz and Andrew van der Stock
- The OWASP Online Academy with John Patrick Lita and Jerry Hoff
- AppSec USA 2015 Overview with Ben Hagen and Michael Coates
- Paul Ritchie, Executive Director, Talks Present, Past and Future of OWASP
- OWASP Offensive Web Testing Framework with Bharadwaj Machiraju and Abraham Aranguren
- Tobias Gondrom on the OWASP Strategic Goals for 2015
- 2015 AppSecEU Pre Conference Update
- OWASP Project Reviews with Johanna Curiel
- 2015 OWASP Project Summit in NYC with Tom Brennan
- Seba Deleersnyder Discusses SAMM (Software Assurance Maturity Model) Summit in Dublin, Ireland
- 2015 AppSec California Post Mortem with Richard Greenberg and Neil Matatall
- John Melton and the OWASP AppSensor Project
- Moxie Marlinspike on Open Source Security for Mobile Devices
- Dibbe Edwards - DevOps and Open Source at IBM
- The WebGoat Project with Rick Lawson and Jason White
- Kevin E. Greene on OWASP and the SWAMP Project
- AppSec USA 2014, Denver - Damon Edwards, Matt Tesauro, Eoin Keary, Martin Knobloch
- OWASP Board Candidate Interviews - Mateo Martinez
- OWASP Board Candidate Interviews - Jim Manico, Timur Khrotko
- OWASP Board Candidate Interviews - Andrew van der Stock, Nigel Phair, Abbas Naderi
- OWASP 2014 Board Candidate Interviews - Israel Bryski, Matt Konda, Bil Corry and Tahir Khan
- Jonathan Carter - OWASP and Mobile Security
- OWASP Statement on the Security of the Internet 2014
- Sarah Baso : The Final OWASP Interview
- Wait! Wait! Don’t pwn me! from AppSec Europe 2014
- Eoin Keary on Women in Security and Growing an OWASP Chapter
- Achim Hoffmann and the o-Saft Project for Scanning SSL Connections
- OWASP Top 10 Privacy Risks Project with Florian Stahl and Stefan Burgmair
- The Run Up to a Massive Cyber Security Month with Tom Brennan
- Wolfgang Goerlich on a Real World Example of The Phoenix Project in Action
- The OWASP Hacky Easter Challenge with Ivan Bütler
- Dwayne Melancon - What InfoSec Can Learn from Video Games
- The OWASP Top Ten Proactive Controls Project with Jim Bird
- Melissa Elliot on the HeartBleed Bug at Yahoo
- 2014 AppSec APAC - Post Mortem (English)
- The OWASP Cornucopia Project with Colin Watson
- The OWASP WebSpa Project with Yiannis Pavlosoglou and Jim Manico
- 2014 AppSec APAC : History and Overview (Japanese and English)
- AppSec Europe 2014 : What To Expect with Host Adrian Winckles
- AppSec USA 2013 : Mark Arnold Talks about the Boston OWASP Chapter
- Not Making a Statement is a Statement in its Own Right
- National Security Awareness Month #NCSAM
- AppSec APAC 2014 with Tobias Gondrom - What to Expect
- AppSec USA 2013: Larry Conklin and the Code Review Book Project
- AppSec USA 2013: Jim Manico - Life After OWASP Podcasting
- AppSec USA 2013: Zed Attack Proxy Project with Simon Bennetts
- AppSec USA 2013: Abbas Naderi and the OWASP PHP Security Project)
- AppSec USA 2013: Michael Coates on the AppSensor Project
- The OWASP Application Security CISO Guide with Marco Morana and Tobias Gondrom
- The Purpose of OWASP, an Interview with Co-Founder Dennis Groves
- Wait! Wait! Don't pwn me! - Full recording from AppSec USA 2013
- Sarah Baso - What does it take to support 43,000 members in 100+ countries?
- Samantha Groves - Getting the Most from OWASP Projects
- Kate Hartmann - The Future of Virtual Chapter Meetings
- Kelly Santalucia - Growing OWASP and the Outreach Programs
- Tom Brennan - What to Expect at AppSecUSA 2013
- AppSec USA 2013 - OWASP Panel on Using Components with Known Vulnerabilities
Syndication
As of November 14, 2019, we have had 409,507 plays in total
As of May 26, 2019, we have had 366,768 plays in total
As of August 29, 2017, we had over 221,000+ plays of the broadcast.
As of July 7, 2016, we had over 151,000+ plays of the broadcast.
As of March 21, 2016, we had over 133,500+ plays of the broadcast.
As of February 25, 2016, we had over 127,000+ plays of the broadcast.
As of January 22, 2016, we had over 120,000+ plays of the broadcast.
As of November 24, 2015, we had over 114,100+ plays of the broadcast.
As of September 3, 2015, we had over 102,500+ plays of the broadcast.
As of July 31, 2015, we had over 98,800+ plays of the broadcast.
As of June 29, 2015, we had over 92,000+ plays of the broadcast.
Thanks for your continuing support.
OWASP Podcast Series Hosted by Jim Manico
- The OWASP foundation presents the OWASP PODCAST SERIES hosted and produced by Jim Manico.
- Listen as Jim interviews OWASP volunteers, industry experts and leaders within the field of web application security.
- Questions? Comments? Please email [email protected]
- Care to join our email list? Sign up here https://lists.owasp.org/mailman/listinfo/owasp-podcast
- Want to see the process and equipment behind the show? click here
<paypal>OWASP Podcast</paypal> |
# | Date | Actions | Description |
---|---|---|---|
98 | March 3, 2014 | Listen Now | Yiannis Pavlosoglou discussing The OWASP WebSpa Project. More info on SoundCloud. |
97 | November 2, 2013 | Listen Now | Les Hazlewood discussing Apache SHIRO |
96 | November 2, 2013 | Listen Now | Nabil Hannan discussing BSIMM |
95 | June 13, 2013 | Listen Now | Professor Daniel J. Bernstein (Crypto Worst Practices) You can also watch or obtain the slides for this lecture |
94 | February 18, 2013 | Listen Now | Professor Bart Preneel (Crypto Basics) You can also watch or obtain the slides for this lecture |
93 | September 30, 2012 | Listen Now | Show Transcript | Professor Frank Piessens You can also watch or obtain the slides for this lecture |
92 | June 19, 2012 | Listen Now | AppSec Research 2012 Team |
91 | May 3, 2012 | Listen Now | Troy Hunt (.NET Security) |
90 | February 17, 2012 | Listen Now | Raul Siles (Session Management Cheat Sheet ) |
89 | November 28, 2011 | Listen Now | Jack Mannino and Joey Peloquin (Mobile) |
88 | September 19, 2011 | Listen Now | Jason Li (Global Projects Committee) |
87 | July 20, 2011 | Listen Now | John Heimann (Oracle) |
** | July 16, 2011 | Listen Now | Dave Wichers, Sebastien Deleersnyder, Michael Coates, Christian Heinrich (2012 OWASP Election Candidates) |
86 | July 7, 2011 | Listen Now | Kevin Mahaffey, Jack Mannino and Chris Wysopal (Mobile Security) |
85 | June 22, 2011 | Listen Now | Ken van Wyk (iGoat) |
84 | May 10, 2011 | Listen Now | Alex Behar (DDoS Mitigation) |
83 | March 19, 2011 | Listen Now | Dave Ferguson (Forgot Password) |
82 | February 7, 2011 | Listen Now | Dave Wichers (OWASP Board Member) |
81 | January 8, 2011 | Listen Now | Brian Chess (Non-SaaS Static Analysis) |
80 | December 11, 2010 | Listen Now | Chris Wysopal (SaaS Static Analysis) |
79 | November 27, 2010 | Listen Now | Tony UV (Threat Modeling) |
78 | October 13, 2010 | Listen Now | AppSec Roundtable with Jeff Williams, Andrew van der Stock, Tom Brennan, Samy, Jeremiah Grossman and Jim Manico (Complete Chaos) |
77 | October 13, 2010 | Listen Now | Rafal Los |
76 | September 22, 2010 | Listen Now | Bill Cheswick (Account Lockout) |
75 | September 15, 2010 | Listen Now | Brandon Sterne (Content Security Policy) |
74 | September 2, 2010 | Listen Now | Eoin Keary (Code Review) |
73 | June 30, 2010 | Listen Now | Jeremiah Grossman and Robert Hansen |
72 | June 25, 2010 | Listen Now | Interview with Ivan Ristic (WAF) |
71 | April 19, 2010 | Listen Now | Top Ten with Robert Hansen (Redirects) |
70 | April 19, 2010 | Listen Now | Top Ten with Michael Coates (TLS) |
69 | April 19, 2010 | Listen Now | Top Ten with Eric Sheridan (CSRF) |
68 | April 19, 2010 | Listen Now | Top Ten with Kevin Kenan (Cryptographic Storage) |
67 | April 19, 2010 | Listen Now | Show Transcript | Top Ten with Jeff Williams (XSS) |
66 | April 14, 2010 | Listen Now | Interview with Brad Arkin (Adobe) |
65 | April 13, 2010 | Listen Now | AppSec Roundtable with Boaz Gelbord, Dan Cornell, Jeff Williams, Johannes Ullrich and Jim Manico (File Upload) |
64 | March 30, 2010 | Listen Now | Interview with Andy Ellis (Availability) |
63 | March 17, 2010 | Listen Now | Interview with Ed Bellis (eCommerce) |
62 | March 12, 2010 | Listen Now | Show Notes | Interview with Amichai Shulman (WAF) |
61 | March 10, 2010 | Listen Now | Show Notes | Interview with Richard Bejtlich (Network Monitoring) |
60 | February 5, 2010 | Listen Now | Interview with Jeremiah Grossman and Robert Hansen (Google pays for vulns) |
59 | February 3, 2010 | Listen Now | AppSec Roundtable with Boaz Gelbord, Ben Tomhave, Dan Cornell, Jeff Williams, Andrew van der Stock and Jim Manico (Aurora+) |
58 | February 2, 2010 | Listen Now | Interview with Ron Gula (Web Server Scanning, IDS/IPS) |
57 | December 21, 2009 | Listen Now | Show Notes | Interview with David Linthicum (Cloud Computing) |
56 | December 7, 2009 | Listen Now | Show Notes | Interview with Adar Weidman (Regular Expression DOS) |
55 | November 26, 2009 | Listen Now | Show Notes | AppSec Roundtable with Boaz Gelbord, Jason Lam, Jim Manico and Jeff Williams (AppSec Justification) |
54 | November 24, 2009 | Listen Now | Interview with George Hesse (German Chapter Leader) |
53 | November 24, 2009 | Listen Now | Interview with Amichai Shulman (WAF) |
52 | November 5, 2009 | Listen Now | Sandro Gauci (wafw00f) |
51 | October 30, 2009 | Listen Now | Show Transcript | Interview with Michael Coates (Real Time Defenses, OWASP AppSensor) |
50 | October 30, 2009 | Listen Now | Interview with Eldad Chai (Business Logic Attacks) |
49 | October 30, 2009 | Listen Now | Interview with Andre Riancho (OWASP w3af) |
48 | October 30, 2009 | Listen Now | Interview with Giorgio Fedon (Browser Security in Banking) |
47 | October 23, 2009 | Listen Now | Interview with Erlend Oftedal (Agile) |
46 | October 23, 2009 | Listen Now | Interview with Luca Carettoni and Stefano Di Paola (HTTP Parameter Pollution) |
45 | October 16, 2009 | Listen Now | Show Notes | Interview with Buanzo (Enigform ) |
44 | October 8, 2009 | Listen Now | Show Notes | Interview with Andy Steingruebl (PayPal Secure Development Manager) |
43 | October 2, 2009 | Listen Now | Show Notes | Interview with Mike Smith (http://www.guerilla-ciso.com/) |
42 | October 1, 2009 | Listen Now | Show Notes | Roundtable with Matt Fisher, Jim Manico, Dan Philpott, Jack Whitsitt and Doug Wilson (FISMA, US Federal Cybersecurity) |
41 | September 26, 2009 | Listen Now | Show Notes | Show Transcript | Interview with David Rice (Author of Geekonomics) |
40 | September 23, 2009 | Listen Now | Show Notes | Interview with Rohit Sethi (OWASP J2EE Pattern Project) |
39 | August 25, 2009 | Listen Now | Show Notes | Interview with Gunnar Peterson (Webservices) |
38 | August 25, 2009 | Listen Now | Show Notes | Interview with the OWASP Global Education Committee |
37 | August 22, 2009 | Listen Now | Show Notes | Interview with Jason Lam and Johannes Ullrich (SANS Institute) |
36 | August 15, 2009 | Listen Now | Show Notes | May 2009 News Commentary Recorded July 23 with Boaz Gelbord, Andre Gironda, Jason Lam, Jim Manico, Alex Smolen, Ben Tomhave, Andrew van der Stock and Jeff Williams (part 2) |
35 | August 4, 2009 | Listen Now | Show Notes | Interview with Anton Chuvakin, Ph.D (PCI) |
34 | July 30, 2009 | Listen Now | Show Notes | Interview with Amichai Shulman (WAF) |
33 | July 25, 2009 | Listen Now | Show Notes | Interview with Paolo Perego (OWASP Orizon) |
32 | July 21, 2009 | Listen Now | Show Notes | May 2009 News Commentary Recorded June 11 with Arshan Dabirsiaghi, Boaz Gelbord, Jim Manico, Andrew van der Stock and Jeff Williams (part 1) |
31 | July 4, 2009 | Listen Now | Show Notes | Show Transcript | Interview with Mark Curphey (OWASP Founder) |
30 | July 2, 2009 | Listen Now | Show Notes | Interview with Billy Hoffman and Matt Wood (HP Application Security Research) |
29 | June 30, 2009 | Listen Now | Show Notes | Interview with Justin Clarke (SQL Injection) |
28 | June 26, 2009 | Listen Now | Show Notes | Interview with Ross J. Anderson |
27 | June 26, 2009 | Listen Now | Show Notes | Interview with Rafal Los (The Skeletor of AppSec) |
26 | June 17, 2009 | Listen Now | Show Notes | April 2009 News Commentary Recorded May 28 with Tom Brennan, Andre Gironda, Jim Manico, Alex Smolen and Jeff Williams (part 2) |
25 | June 15, 2009 | Listen Now | Show Notes | Interview with James McGovern |
24 | June 12, 2009 | Listen Now | Show Notes | April 2009 News Commentary Recorded May 14 with Andre Gironda, Jim Manico, Alex Smolen and Jeff Williams (part 1) |
23 | June 1, 2009 | Listen Now | Show Notes | Interview with Dr. Boaz Gelbord |
22 | May 22, 2009 | Listen Now | Show Notes | Interview with Dan Cornell (Membership Committee) |
21 | May 20, 2009 | Listen Now | Show Notes | Show Transcript | Interview with Richard Stallman |
20 | May 13, 2009 | Listen Now | Show Notes | Interview with Mike Bailey |
19 | May 11, 2009 | Listen Now | Show Notes | March 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 2) |
18 | April 30, 2009 | Listen Now | Show Notes | Interview with Jeremiah Grossman |
17 | April 21, 2009 | Listen Now | Show Notes | Interview with Robert Hansen |
16 | April 9, 2009 | Listen Now | Show Notes | Dave Aitel (Demonstrates Cool) |
15 | April 4, 2009 | Listen Now | Show Notes | Brian Chess (BSIMM) |
14 | March 25, 2009 | Listen Now | Show Notes | Pravir Chandra (OWASP SAMM) |
13 | March 23, 2009 | Listen Now | Show Notes | March 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 1) |
12 | March 11, 2009 | Listen Now | Show Notes | Interview with Ryan Barnett (OWASP ModSecurity Core Ruleset) |
11 | March 4, 2009 | Listen Now | Show Notes | Interview with MITRE (Steve Christey and Bob Martin) |
10 | February 26, 2009 | Listen Now | Show Notes | Show Transcript | Interview with Ken van Wyk |
9 | February 20, 2009 | Listen Now | Show Notes | February 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 2) |
8 | February 20, 2009 | Listen Now | Show Notes | February 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 1) |
7 | January 30, 2009 | Listen Now | Show Notes | Interview with Jeff Williams |
6 | January 24, 2009 | Listen Now | Show Notes | Roundtable with Andre Gironda, Brian Holyfield, Jim Manico, Marcin Wielgoszewski |
5 | January 15, 2009 | Listen Now | Show Notes | Interview with Gary McGraw |
4 | January 13, 2009 | Listen Now | Show Notes | Interview with Andrew van der Stock (OWASP Developers Guide) |
3 | December 30, 2009 | Listen Now | Show Notes | Interview with Matt Tesauro (OWASP Live CD) |
2 | December 20, 2008 | Listen Now | Show Notes | Interview with Stephen Craig Evans (OWASP WebGoat/ModSecurity Project) |
1 | November 21, 2008 | Listen Now | Show Notes | News Commentary by Arshan Dabirsiaghi, Jeremiah Grossman, Jim Manico and Jeff Williams |
Contributors and Sponsors of the Original Series
Host and Executive Producer
Co-hosts
- Matt Tesauro
- Thomas Herela
Mastering, Effects, Audio Tech, Producer
- Kevin Coons from ManaTribe
Artwork
- Larry Casey
- Gareth Heyes
Transcript
Sponsors
- The OWASP Foundation
- Music by Shpongle courtesy of Twisted Records
Host and Executive Producer
Guest Podcasters and contributors
Artwork
- Larry Casey
- Gareth Heyes
Sponsors
- The OWASP Foundation
- Sonatype
- CATScan® from ProactiveRISK