Ep. 96: Security Flaws as Defects

Ep. 96: Security Flaws as Defects

Author: Jardine Software Inc. April 16, 2018 Duration: 27:35
In this episode we talk about treating security flaws as defects and embedded vs. built-in security. Do you treat security flaws differently? What barriers does that create? For more info go to https://www.developsec.com or follow us on twitter (@developsec). Join the conversations.. join our slack channel. Email james@developsec.com for an invitation. DevelopSec provides application security consulting and training to add value to your application ...

Ever find yourself wondering how the digital tools you build every day can be made more resilient? DevelopSec: Developing Security Awareness, from Jardine Software Inc., digs into the practical realities of application security. This isn't about abstract theory; it's a grounded conversation for developers, engineers, and tech leaders who know that security is now a core part of the development lifecycle. Each episode focuses on a specific topic, breaking down how vulnerabilities emerge in code and, more importantly, how to identify and mitigate them before they become a problem. You'll hear straightforward discussions on everything from common coding flaws to emerging threats, providing actionable insights you can apply directly to your projects. The goal is to build a more intuitive security mindset, transforming it from a compliance checkpoint into a natural part of the development process. Tune into this podcast for a clear-eyed look at securing applications, where complex concepts are made accessible without sacrificing depth. It's a resource for anyone ready to move beyond curiosity and actively strengthen their work.
Author: Language: English Episodes: 100

DevelopSec: Developing Security Awareness
Podcast Episodes
Ep. 88: Meteor Security with Tim Medin [not-audio_url] [/not-audio_url]

Duration: 42:33
In this episode, James talks with Tim Medin regarding Meteor and security. If you develop with Meteor or have to test it, there is a lot of information packed in. More about Tim Medin (@timmedin): Red Seige website - htt…
Ep. 87: Apple Sign-in Bug Take-Aways [not-audio_url] [/not-audio_url]

Duration: 24:20
You have heard about the Apple Sign-in Bug on High Sierra. Now lets talk about how we can use this example to better our current development processes to protect ourselves. Link to mentioned article: https://www.theguard…
Ep. 86: Vulnerable 3rd Party Components [not-audio_url] [/not-audio_url]

Duration: 18:34
In this episode, James talks the use of 3rd party components and how to handle determining if they are vulnerable or not. Links: OWASP Dependancy Check - https://www.owasp.org/index.php/OWASP_Dependency_Check GitHub Blog…
Ep. 85: Open Redirect Revisited [not-audio_url] [/not-audio_url]

Duration: 25:01
In this episode, James talks about open redirect and why it matters from a security perspective. He also shows how this information can be used in your personal technology use, not just in development. For more info go t…
Ep. 84: Understanding the Technology [not-audio_url] [/not-audio_url]

Duration: 23:30
You know your development language and platform, but do you really know the ins and outs of web application technology? How well do you know HTTP, HTML, etc? James talks about a few scenarios where really understanding h…
Ep. 83: Authorization Overview [not-audio_url] [/not-audio_url]

Duration: 20:54
In this episode, James talks about authorization and some common areas where it poses a risk. He also goes over some techniques to help test authorization. For more info go to https://www.developsec.com or follow us on t…
Ep. 82: Equifax Take-aways [not-audio_url] [/not-audio_url]

Duration: 25:55
The Equifax breach was a major news story. James talks about some of the security controls mentioned and how to start a conversation within your organization about them. Want to listen on YouTube? Check out our channel w…
Ep. 81: JavaScript in HREF and SRC (XSS) [not-audio_url] [/not-audio_url]

Duration: 20:20
We talk about cross-site scripting (XSS) all the time, but often overlook the ability to use javascript: in anchor tags. James talks about this unique ability and how to protect your applications from it. The related blo…
Ep. 80: Understanding Security of Your Platforms [not-audio_url] [/not-audio_url]

Duration: 19:35
We use a lot of platforms and frameworks when we develop an application. These platforms may provide security features, but do you know which ones? James talks about the importance of understanding your platforms and wha…
Ep. 79: Marketing with USB Drives [not-audio_url] [/not-audio_url]

Duration: 15:40
James talks about the risk of USB thumb drives and their risk using the recent BCBS marketing campaign as an example. (http://www.fiercehealthcare.com/privacy-security/bcbs-alabama-re-evaluates-usb-marketing-campaign-ami…