Ep. 50: How Serious is Username Enumeration

Ep. 50: How Serious is Username Enumeration

Author: Jardine Software Inc. July 28, 2016 Duration: 23:06
In this episode, James talks about what Username Enumeration is, how it can be used by attackers, and some ways to help reduce the risk of it. For more info go to https://www.developsec.com or follow us on twitter (@developsec). Presented by Jardine Software Inc. (https://www.jardinesoftware.com) Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help. Check out our 30 ...

Ever find yourself wondering how the digital tools you build every day can be made more resilient? DevelopSec: Developing Security Awareness, from Jardine Software Inc., digs into the practical realities of application security. This isn't about abstract theory; it's a grounded conversation for developers, engineers, and tech leaders who know that security is now a core part of the development lifecycle. Each episode focuses on a specific topic, breaking down how vulnerabilities emerge in code and, more importantly, how to identify and mitigate them before they become a problem. You'll hear straightforward discussions on everything from common coding flaws to emerging threats, providing actionable insights you can apply directly to your projects. The goal is to build a more intuitive security mindset, transforming it from a compliance checkpoint into a natural part of the development process. Tune into this podcast for a clear-eyed look at securing applications, where complex concepts are made accessible without sacrificing depth. It's a resource for anyone ready to move beyond curiosity and actively strengthen their work.
Author: Language: English Episodes: 100

DevelopSec: Developing Security Awareness
Podcast Episodes
When Security Recommendations Miss The Point [not-audio_url] [/not-audio_url]

Duration: 18:39
Ever read a security advisory that told you to “use a VPN” to protect a Bluetooth device? In this episode we talk about how bad or inaccurate recommendations can be a problem with security findings. We take a look at an…
Ep. 128: OWASP Top 10 2025 [not-audio_url] [/not-audio_url]

Duration: 30:50
In this episode James gives an overview of the new OWASP Top 10 2025. He shares some insights into the history, changes, and additional thoughts on the top 10. Do you have any thoughts on the OWASP Top 10? Let us know. R…
Ep. 127: Importance of Terminology [not-audio_url] [/not-audio_url]

Duration: 13:22
In this episode, James talks about the difference between end-to-end encryption and the standard encryption in transit most web applications implement. There is an interesting story (referenced below) that was using end-…
Ep. 125: From Flat Tires to AppSec: The Power of Tools and Process [not-audio_url] [/not-audio_url]

Duration: 21:07
In this episode, James shares a story about fixing a flat tire on an E-Scooter and how it relates to security. He shows how the combination of tools, process, and knowledge can lead to a successful outcome. Can you be su…
Ep. 124: Double-ClickJacking [not-audio_url] [/not-audio_url]

Duration: 21:07
In this episode, I go over what Double-ClickJacking is and what you can potentially do about it to reduce the risk to your applications. Will this be the new finding on everyone's pen tests this year? Paulos Yibelo first…
Ep. 123: Goals of Security Culture - Sort of? [not-audio_url] [/not-audio_url]

Duration: 7:56
In this episode, I talk about how security is a part of everyone's role and the labeling of "Security Culture". I share some ideas on how to improve on role based security awareness and building stronger relationships be…
Ep. 122: Integrating Security Responsibilities into Development [not-audio_url] [/not-audio_url]

Duration: 18:04
In this episode I talk about assigning responsibility for secure development and how the dev and security teams should be working together to accomplish a common goal. I also discuss the importance of updating developer…
Ep. 121 - Evolving Ransomware: Unique Tactics for Payment [not-audio_url] [/not-audio_url]

Duration: 17:44
In this episode I talk about the evolving world of ransomware. I discuss a few examples of unique tactics the malicious actors are using to put pressure on organizations to pay the ransom. Referenced Articles: https://ww…
Ep. 120: Addressing Root Cause - Vulnerable Components [not-audio_url] [/not-audio_url]

Duration: 16:30
In this episode we talk about addressing the root cause of an issue versus the symptoms. How can the process of keeping application components updated be improved? For more info go to https://www.developsec.com or follow…