Afleveringen

  • In Season 2 Episode 7, we talk to Jonathan Cran, Founder @ Stealth.

    Jonathan is a seasoned security industry veteran, discussing the evolution of AI in security, the challenges of adopting AI technologies in enterprises, and the future of attack surface management. We explore the role of AI agents, the importance of context in security solutions, and provide insights for cybersecurity entrepreneurs looking to navigate the rapidly changing landscape of technology and security.

    Key Takeaways

    - AI agents are still in early development stages.

    - Consistency is crucial for AI adoption in enterprises.

    - Automation can significantly enhance security processes.

    - Contextual understanding is key for effective risk scoring.

    - Generative AI can both solve security problems and create new ones.

    - The demand for automated remediation solutions is growing.

    - Attack surface management is evolving with new technologies.

    - Understanding vulnerabilities requires a comprehensive approach.

    - Entrepreneurs should focus on market problems, not just technology.

    - Investors prioritize team, timing, and traction when evaluating startups.

    Tune in to find out more!

    Contacting Jonathan

    * LinkedIn: https://www.linkedin.com/in/jcran/

    Contacting Anshuman

    * LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/

    * X: ⁠⁠⁠⁠https://x.com/anshuman_bh

    * Website: ⁠⁠⁠⁠https://anshumanbhartiya.com/

    * ⁠⁠⁠⁠Instagram: ⁠⁠⁠https://www.instagram.com/anshuman.bhartiya

    Contacting Sandesh

    * LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/

    * X: ⁠⁠⁠⁠https://x.com/JubbaOnJeans

    * Website: ⁠⁠⁠⁠https://boringappsec.substack.com/

  • In Season 2 Episode 6, we talk to Vibhav Sreekanti, Co-Founder & CTO @ProphetSecurity .

    We discuss the evolving landscape of AI in cybersecurity, the skepticism surrounding generative AI, and the importance of experimentation with AI agents. Vibhav shares insights on building specialized agents for security operations, the challenges of deploying AI in production, and the critical need for security in AI infrastructure. The conversation emphasizes the necessity of asking tough questions about data security and the role of AI in enhancing security operations. We discuss the evolving landscape of security operations, focusing on the role of AI agents and the challenges faced by SOAR platforms. We explore the importance of centralized authentication, the need for human oversight in AI applications, and the lessons learned from Vibhav's startup journey, emphasizing the significance of team dynamics and market readiness.

    Key Takeaways

    - Vibhav has spent his career at startups, focusing on building products and teams.

    - Keeping up with AI advancements requires active engagement on platforms like Twitter.

    - Hands-on experimentation with new tools is crucial for understanding their applicability.

    - Skepticism in AI is warranted due to past over-promises in the industry.

    - Generative AI can enhance security operations if implemented thoughtfully.

    - AI agents should be used selectively based on the problem at hand.

    - Building a suite of specialized agents can lead to more effective outcomes.

    - Security practices for distributed systems apply to agentic architectures as well.

    - Data security and handling are paramount when using third-party AI models.

    - Implementing gateways for AI interactions can help enforce security policies.

    - Centralized authentication and authorization using OPA is compelling.

    - SOAR platforms have not lived up to their promises, leading to alert fatigue.

    - AI agents can enhance investigative tasks in security operations.

    - Human oversight is essential in AI-driven security solutions.

    - The importance of team dynamics cannot be overstated in startups.

    - Understanding market dynamics is crucial for startup success.

    - Being too early in a market can be as detrimental as being wrong.

    - Feedback loops are vital for improving AI systems in security.

    - The alert is just the beginning of incident response.

    - The journey of AI agents in security is still in its infancy.

    Tune in to find out more!

    Contacting Vibhav

    * LinkedIn: https://www.linkedin.com/in/vibhavs/

    * Prophet Security: https://www.prophetsecurity.ai/

    Contacting Anshuman

    * LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/

    * X: ⁠⁠⁠⁠https://x.com/anshuman_bh

    * Website: ⁠⁠⁠⁠https://anshumanbhartiya.com/

    * ⁠⁠⁠⁠Instagram: ⁠⁠⁠https://www.instagram.com/anshuman.bhartiya

    Contacting Sandesh

    * LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/

    * X: ⁠⁠⁠⁠https://x.com/JubbaOnJeans

    * Website: ⁠⁠⁠⁠https://boringappsec.substack.com/

  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • In Season 2 Episode 5, we talk to Drew Dennison, Co-Founder & CTO @ Semgrep.We discuss the evolution of Semgrep as a code security tool, its focus on custom rules, and the importance of open source in democratizing application security. Drew shares insights from his entrepreneurial journey, the challenges faced in the early days of Semgrep, and the lessons learned from working in both the defense and civilian sectors of cybersecurity. The conversation highlights the shifting paradigms in application security, emphasizing the need for comprehensive coverage and the integration of modern development practices. In this conversation, Drew discusses the evolving landscape of cybersecurity, emphasizing the importance of custom rules in data security, the convergence of various security practices, and the role of open source in driving community engagement. He also explores the integration of AI and LLMs in code security, highlighting the potential for these technologies to enhance security processes while maintaining the necessity of human oversight. The discussion culminates in insights about the future of Semgrep Assistant and the balance between automation and human expertise in security.Key Takeaways- Semgrep is a code security tool focused on custom rules.- The importance of understanding user problems in product development.- Open source tools can democratize access to security solutions.- The evolution of static analysis tools has improved user experience.- Insights from the defense sector highlight the asymmetry in cybersecurity.- Companies often overlook basic security hygiene in favor of advanced solutions.- The modern application stack requires a holistic security approach.- 100% code coverage is now achievable with modern tools.- Community contributions enhance the effectiveness of open source projects.- The architecture of software development has shifted towards microservices. User data doesn't go any deeper than this in our stack.- The convergence of static analysis, software composition analysis, and secret scanning is notable.- At the technology level, we think of it as all basically the same problem.- We always knew we wanted to have an enterprise component for it.- We recognized early that LLMs were going to be the future of security.- Generative AI can help automate rule writing and prioritization.- Contextualization in security is essential for effective rule application.- The Semgrep Assistant aims to enhance developer trust and confidence.- AI will complement human roles rather than replace them in security.- Automation in security processes is crucial, similar to aviation.Tune in to find out more! Contacting Drew* LinkedIn: https://www.linkedin.com/in/drewdennison/* Semgrep: https://semgrep.dev/Contacting Anshuman* LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/* X: ⁠⁠⁠⁠https://x.com/anshuman_bh* Website: ⁠⁠⁠⁠https://anshumanbhartiya.com/* ⁠⁠⁠⁠Instagram: ⁠⁠⁠https://www.instagram.com/anshuman.bhartiya Contacting Sandesh* LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/* X: ⁠⁠⁠⁠https://x.com/JubbaOnJeans* Website: ⁠⁠⁠⁠https://boringappsec.substack.com/

  • In Season 2 Episode 4, we talk to Varun Badhwar, Founder & CEO @ Endor Labs.We discuss the current state of application security, the challenges faced by development teams, and the importance of integrating security into the software development lifecycle. Varun shares insights from his previous experiences in building and acquiring cybersecurity companies, emphasizing the need for effective compliance strategies and the balance between platform solutions and best-of-breed tools. In this conversation, Varun Badhwar discusses the evolving landscape of cybersecurity, emphasizing the importance of compliance, product usability, and the integration of AI technologies like LLMs in vulnerability management. He highlights the need for a user-centric approach in AppSec, the challenges of providing context to engineers, and the future implications of AI in security governance.Key Takeaways- Endor Labs aims to make AppSec more engaging and effective.- Many existing AppSec tools create friction between teams.- The future of software development will involve AI-generated code.- Understanding the software supply chain is crucial for security.- Acquisitions in cybersecurity often fail due to integration issues.- Founders must empathize with practitioner pain to build effective products.- Compliance often drives security priorities in organizations.- Effective integration of tools can enhance security outcomes.- The industry needs to focus on enabling faster business operations.- Balancing platform capabilities with best-of-breed tools is essential.- Compliance is essential for sales enablement in cybersecurity.- First-time founders should focus on product and distribution.- User experience and developer experience are critical in AppSec products.- Contextual information is vital for engineers to make informed decisions.- Automation can help reduce noise in security alerts.- Reachability analysis improves visibility in code dependencies.- Impact assessment is crucial for effective vulnerability remediation.- LLMs can assist in reasoning but need rules for effective application.- AI governance is a growing concern in the software development space.- The industry must adapt to the rapid advancements in AI technology.Tune in to find out more! Contacting Varun* LinkedIn: https://www.linkedin.com/in/vbadhwar/* Endor Labs: https://www.endorlabs.com/Contacting Anshuman* LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/* X: ⁠⁠⁠⁠https://x.com/anshuman_bh* Website: ⁠⁠⁠⁠https://anshumanbhartiya.com/* ⁠⁠⁠⁠Instagram: ⁠⁠⁠https://www.instagram.com/anshuman.bhartiya Contacting Sandesh* LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/* X: ⁠⁠⁠⁠https://x.com/JubbaOnJeans* Website: ⁠⁠⁠⁠https://boringappsec.substack.com/

  • In Season 2 Episode 3, we interview Robert Wood, Founder & CEO @ SideKick Security.We discuss Rob's journey from working at Cigital to starting his own consulting firm, the challenges of point solutions in cybersecurity, and the importance of soft skills in the industry. Rob shares insights on platformization versus services, tailoring security programs to unique needs, and building a security data lake to enhance data sharing and collaboration among teams. The conversation emphasizes the need for effective communication and community engagement in cybersecurity.

    Key Takeaways

    - Sidekick Security aims to address the challenges of siloed point solutions in cybersecurity.

    - Rob emphasizes the importance of soft skills alongside technical skills in cybersecurity roles.

    - Platformization can help reduce silos, but unique security needs must be considered.

    - Every security program is unique and should be approached accordingly.

    - Building a security data lake can enhance data sharing and collaboration among teams.

    - Effective communication is crucial for security professionals to succeed.

    - Engaging with the community is essential for growth in the cybersecurity field.

    - Regulation and governance discussions are crucial as new technologies emerge.Tune in to find out more! Contacting Robert* LinkedIn: https://www.linkedin.com/in/holycyberbatman/

    * SideKick Security: https://sidekicksecurity.io/Contacting Anshuman* LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/* X: ⁠⁠⁠⁠https://x.com/anshuman_bh* Website: ⁠⁠⁠⁠https://anshumanbhartiya.com/* ⁠⁠⁠⁠Instagram: ⁠⁠⁠https://www.instagram.com/anshuman.bhartiya Contacting Sandesh* LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/* X: ⁠⁠⁠⁠https://x.com/JubbaOnJeans* Website: ⁠⁠⁠⁠https://boringappsec.substack.com/

  • In Season 2 Episode 2, we interview Dustin Lehr, Co-Founder, Chief Product & Technology Officer at Katilyst.We discuss the significance of security champions in application security. We explore the cultural aspects of implementing security champions programs, the challenges of maintaining engagement, and the importance of leadership support. The conversation delves into measuring the success of these programs, the role of behavioral science, and the impact of effective training and gamification in enhancing security awareness within organizations. Dustin discusses the Octalysis framework, which identifies eight core human motivators that can be leveraged in gamification and cybersecurity culture. He emphasizes the importance of building relationships within organizations to change perceptions of security teams and foster a collaborative environment. Dustin also shares insights on the intersection of creativity and cybersecurity, his motivations for starting a company, and the role of AI in enhancing human interactions rather than replacing them.

    Key Takeaways

    - Security champions programs are crucial for fostering a security culture.

    - Engagement and leadership support are key to program success.

    - Measuring success can be challenging but is essential.

    - Behavioral science plays a significant role in security engagement.

    - Gamification can enhance training but must be used wisely.

    - Curiosity can drive initial engagement but must be sustained.

    - Training should be relevant and tailored to the audience.

    - Creating empathy between teams improves security outcomes.

    - Deep gamification focuses on understanding human drives.

    - Starting a company is about helping others, not just profit.

    - AI can augment human interactions but cannot replace them.

    - Security teams should focus on providing value and support.

    - Human connection is essential in cybersecurity.

    - The importance of community and collaboration in security efforts.Tune in to find out more! Contacting Dustin* LinkedIn: https://www.linkedin.com/in/dustinlehr/

    * Security Champion Success Guide: https://securitychampionsuccessguide.org/Contacting Anshuman* LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/* X: ⁠⁠⁠⁠https://x.com/anshuman_bh* Website: ⁠⁠⁠⁠https://anshumanbhartiya.com/* ⁠⁠⁠⁠Instagram: ⁠⁠⁠https://www.instagram.com/anshuman.bhartiya Contacting Sandesh* LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/* X: ⁠⁠⁠⁠https://x.com/JubbaOnJeans* Website: ⁠⁠⁠⁠https://boringappsec.substack.com/

  • In Season 2 Episode 1, we interview Jimmy Mesta, a seasoned expert in application security and co-founder of RAD Security. We discuss the evolution of Kubernetes, its security challenges, and the importance of understanding the complexities of cloud-native infrastructure. Jimmy shares insights from his journey of starting a company, the role of AI in security, and the nuances of investing in security startups. The conversation highlights the need for a comprehensive approach to security that encompasses both application and infrastructure aspects, as well as the importance of mentorship and community in the startup ecosystem.Key Takeaways

    - RAD Security aims to address real-time security for cloud-native infrastructure.- Kubernetes has evolved significantly, but security challenges remain.- Managed Kubernetes services have simplified deployment but not security.- Starting a company requires surrounding yourself with experienced mentors.- RASP solutions faced implementation challenges despite their potential.- Defining applications in a microservices architecture is complex.- AI presents both opportunities and skepticism in the security space.- Investing in startups requires trust and understanding of the founder's journey.- Efficiency in security operations is crucial for success.Tune in to find out more! Contacting Jimmy* LinkedIn: https://www.linkedin.com/in/jimmymesta/* X: https://x.com/jimmestaContacting Anshuman* LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/* X: ⁠⁠⁠⁠https://x.com/anshuman_bh* Website: ⁠⁠⁠⁠https://anshumanbhartiya.com/* ⁠⁠⁠⁠Instagram: ⁠⁠⁠https://www.instagram.com/anshuman.bhartiya Contacting Sandesh* LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/* X: ⁠⁠⁠⁠https://x.com/JubbaOnJeans* Website: ⁠⁠⁠⁠https://boringappsec.substack.com/

  • Welcome to the Boring AppSec Podcast! In Episode 10, we discuss some security predictions that we hope to see in the near future. Some of them are:

    AI agents - different kinds - activity based and/or persona based Security talent is going to get better, hiring is important AI powered security engineers - up leveling junior engineers AI code review assistants - GPT4-o et al Company consolidations happening in the security industry - D&R space ASPM predictions and how AI agents will help evolve this space CISA’s guidance on building secure by default frameworks Automated red teaming Hiring security engineers vs changes in interviewing

    Tune in to find out more!

    References mentioned in the episode:

    OpenAI Security Bots - https://github.com/openai/openai-security-bots Build an AI Appsec Team - https://srajangupta.substack.com/p/building-an-ai-appsec-team CISA and secure design - https://www.cisa.gov/news-events/news/cisa-announces-secure-design-commitments-leading-technology-providers Awesome secure defaults - https://github.com/tldrsec/awesome-secure-defaults Slack vs MSFT teams - https://x.com/TrungTPhan/status/1640866391485194241 The Innovator's Dilemma - https://www.amazon.com/Innovators-Dilemma-Revolutionary-Change-Business/dp/0062060244

    Contacting Anshuman

    LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/anshuman_bh⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Website: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://anshumanbhartiya.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Instagram: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.instagram.com/anshuman.bhartiya/⁠⁠⁠⁠⁠⁠⁠⁠⁠ YouTube: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/@AnshumanBhartiya⁠⁠⁠⁠⁠⁠⁠⁠⁠

    Contacting Sandesh

    LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/JubbaOnJeans/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Website: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://boringappsec.substack.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠
  • Welcome to the Boring AppSec Podcast! In Episode 9, we discuss incidents. Both Sandesh and I share 2 incidents each and the lessons learnt from them. Tune in!

    References mentioned in the episode:

    Log4j - https://www.cisa.gov/news-events/news/apache-log4j-vulnerability-guidance Incident runbook - https://engineering.razorpay.com/how-an-incident-transformed-razorpay-improving-the-5-why-rca-format-378de299b9a2

    Contacting Anshuman

    LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/anshuman_bh⁠⁠⁠⁠⁠⁠⁠⁠⁠ Website: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://anshumanbhartiya.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠ Instagram: ⁠⁠⁠⁠⁠⁠⁠⁠https://www.instagram.com/anshuman.bhartiya/⁠⁠⁠⁠⁠⁠⁠⁠ YouTube: ⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/@AnshumanBhartiya⁠⁠⁠⁠⁠⁠⁠⁠

    Contacting Sandesh

    LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/JubbaOnJeans/⁠⁠⁠⁠⁠⁠⁠⁠⁠ Website: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://boringappsec.substack.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠
  • Welcome to the Boring AppSec Podcast! In Episode 8, we continue discussing bug bounties from where we left off in Episode 3. We discuss how to build mature bug bounty programs, how to start a program, how to convince stake holders to start a program, differences and similarities between vulnerability disclosure programs and bug bounty programs among other things. Tune in!

    Contacting Anshuman

    LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/⁠⁠⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/anshuman_bh⁠⁠⁠⁠⁠⁠⁠⁠ Website: ⁠⁠⁠⁠⁠⁠⁠⁠https://anshumanbhartiya.com/⁠⁠⁠⁠⁠⁠⁠⁠ Instagram: ⁠⁠⁠⁠⁠⁠⁠https://www.instagram.com/anshuman.bhartiya/⁠⁠⁠⁠⁠⁠⁠ YouTube: ⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/@AnshumanBhartiya⁠⁠⁠⁠⁠⁠⁠

    Contacting Sandesh

    LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/⁠⁠⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/JubbaOnJeans/⁠⁠⁠⁠⁠⁠⁠⁠ Website: ⁠⁠⁠⁠⁠⁠⁠⁠https://boringappsec.substack.com/⁠⁠⁠⁠⁠⁠⁠⁠
  • Welcome to the Boring AppSec Podcast! In Episode 7, we discuss how to hire the right security folks on a security engineering team. We go over the interviewing process, what to look out for, how to compose a team, and also share some of our experiences of interviewing including some tips on what a candidate can/should do if they want to get noticed by hiring managers and recruiters.

    Contacting Anshuman

    LinkedIn: ⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/⁠⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠⁠https://twitter.com/anshuman_bh⁠⁠⁠⁠⁠⁠⁠ Website: ⁠⁠⁠⁠⁠⁠⁠https://anshumanbhartiya.com/⁠⁠⁠⁠⁠⁠⁠ Instagram: ⁠⁠⁠⁠⁠⁠https://www.instagram.com/anshuman.bhartiya/⁠⁠⁠⁠⁠⁠ YouTube: ⁠⁠⁠⁠⁠⁠https://www.youtube.com/@AnshumanBhartiya⁠⁠⁠⁠⁠⁠

    Contacting Sandesh

    LinkedIn: ⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/⁠⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠⁠https://twitter.com/JubbaOnJeans/⁠⁠⁠⁠⁠⁠⁠ Website: ⁠⁠⁠⁠⁠⁠⁠https://boringappsec.substack.com/⁠⁠⁠⁠⁠⁠⁠
  • Welcome to the Boring AppSec Podcast! In Episode 6, we discuss the art of Vulnerability Management. What it means, what are some of the problems we've seen as practitioners, what are some ways we've considered to make the process of managing vulnerabilities easy.

    References:

    We will try and add information about all the references we make here. Please enter rabbit holes at will :)

    Gitlab's Security Handbook - https://handbook.gitlab.com/handbook/security/

    Contacting Anshuman

    LinkedIn: ⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠https://twitter.com/anshuman_bh⁠⁠⁠⁠⁠⁠ Website: ⁠⁠⁠⁠⁠⁠https://anshumanbhartiya.com/⁠⁠⁠⁠⁠⁠ Instagram: ⁠⁠⁠⁠⁠https://www.instagram.com/anshuman.bhartiya/⁠⁠⁠⁠⁠ YouTube: ⁠⁠⁠⁠⁠https://www.youtube.com/@AnshumanBhartiya⁠⁠⁠⁠⁠

    Contacting Sandesh

    LinkedIn: ⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠https://twitter.com/JubbaOnJeans/⁠⁠⁠⁠⁠⁠ Website: ⁠⁠⁠⁠⁠⁠https://boringappsec.substack.com/⁠⁠⁠⁠⁠⁠
  • Welcome to the Boring AppSec Podcast! In Episode 5, we dig deep into what threat modeling is from a practitioner's perspective. We compare it with design reviews and discuss when/how/why of threat modeling. In the end, we wrap up by talking about how Gen AI could help threat modeling significantly.

    References:

    We will try and add information about all the references we make here. Please enter rabbit holes at will :)

    Threat modeling manifesto - Threatmodelingmanifesto.org STRIDE framework - https://en.wikipedia.org/wiki/STRIDE_(security) Tools for threat modeling ⁠https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool⁠ ⁠https://www.iriusrisk.com/threat-modeling/freemium⁠ ⁠https://owasp.org/www-project-threat-dragon/⁠ ⁠https://excalidraw.com/⁠ ⁠https://www.securitycompass.com/sdelements/⁠ Talks on threat modeling https://www.youtube.com/watch?v=KGy_KCRUGd4⁠ ⁠https://www.youtube.com/watch?v=wVSyqFdO-D8⁠ Articles - https://www.scaletozero.com/episodes/understanding-threat-modeling-with-jeevan-singh/ Gen AI related threat modeling tools/companies Stride GPT- https://stridegpt.streamlit.app/ Nullify - https://www.nullify.ai/ Remysec - https://www.remysec.com/ Seezo - https://seezo.io/ https://www.sarahtavel.com/p/ai-startups-sell-work-not-software https://github.com/captn3m0/ideas

    Contacting Anshuman

    LinkedIn: ⁠⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠https://twitter.com/anshuman_bh⁠⁠⁠⁠⁠ Website: ⁠⁠⁠⁠⁠https://anshumanbhartiya.com/⁠⁠⁠⁠⁠ Instagram: ⁠⁠⁠⁠https://www.instagram.com/anshuman.bhartiya/⁠⁠⁠⁠ YouTube: ⁠⁠⁠⁠https://www.youtube.com/@AnshumanBhartiya⁠⁠⁠⁠

    Contacting Sandesh

    LinkedIn: ⁠⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠https://twitter.com/JubbaOnJeans/⁠⁠⁠⁠⁠ Website: ⁠⁠⁠⁠⁠https://boringappsec.substack.com/⁠⁠⁠⁠⁠
  • Welcome to the Boring AppSec Podcast! In Episode 4, we discuss how lean AppSec teams run and operate. We share our experiences of having worked in engineering heavy organizations where the "engineer : appsec-engineer" ratio is far from ideal and scaling the AppSec team becomes very important to be able to reasonably manage risk.

    References:

    We will try and add information about all the references we make here. Please enter rabbit holes at will :)

    Soft skills are important - ⁠⁠⁠https://www.softsideofcyber.com/ Bhadra, the vulnerability management platform built and open sourced by Razor Pay - https://github.com/razorpay/bhadra Devin - https://www.cognition-labs.com/introd... Seezo (Automating design reviews) - https://seezo.io/

    Contacting Anshuman

    LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠https://twitter.com/anshuman_bh⁠⁠⁠⁠ Website: ⁠⁠⁠⁠https://anshumanbhartiya.com/⁠⁠⁠⁠ Instagram: ⁠⁠⁠https://www.instagram.com/anshuman.bhartiya/⁠⁠⁠ YouTube: ⁠⁠⁠https://www.youtube.com/@AnshumanBhartiya⁠⁠⁠

    Contacting Sandesh

    LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/in/anandsandesh/⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠https://twitter.com/JubbaOnJeans/⁠⁠⁠⁠ Website: ⁠⁠⁠⁠https://boringappsec.substack.com/⁠⁠⁠⁠
  • Welcome to the Boring AppSec Podcast! In Episode 3, we discuss all things bug bounties. The researcher side as well as the program owner's side. Enter at your own will as we have a lot of hot takes.

    References:

    We will try and add information about all the references we make here. Please enter rabbit holes at will :)

    ⁠Bug Bounty Platforms Bugcrowd - https://www.bugcrowd.com/ HackerOne - https://www.hackerone.com/ Intigrity - https://www.intigriti.com/ Synack - https://www.synack.com/

    2. Vulnerability Disclosure Process - https://www.cisa.gov/coordinated-vulnerability-disclosure-process

    3. Google’s Project Zero vulnerability disclosure policy - https://googleprojectzero.blogspot.com/p/vulnerability-disclosure-faq.html

    4. CVSS Calculator - https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

    5. Handling A Bug Bounty program From A Blue Team Perspective - https://www.youtube.com/watch?v=Vgy150R4bRw&t=0s

    6. Consumer Bug Bounty Panel - https://www.youtube.com/watch?v=Y8X6pV7rdbA&t=0s

    Contacting Anshuman

    LinkedIn: ⁠⁠⁠https://www.linkedin.com/in/anshumanbhartiya/⁠⁠⁠ Twitter: ⁠⁠⁠https://twitter.com/anshuman_bh⁠⁠⁠ Website: ⁠⁠⁠https://anshumanbhartiya.com/⁠⁠⁠ Instagram: ⁠⁠https://www.instagram.com/anshuman.bhartiya/⁠⁠ YouTube: ⁠⁠https://www.youtube.com/@AnshumanBhartiya⁠⁠

    Contacting Sandesh

    LinkedIn: ⁠⁠⁠https://www.linkedin.com/in/anandsandesh/⁠⁠⁠ Twitter: ⁠⁠⁠https://twitter.com/JubbaOnJeans/⁠⁠⁠ Website: ⁠⁠⁠https://boringappsec.substack.com/⁠⁠⁠
  • Welcome to the Boring AppSec Podcast! In Episode 2, we discuss what a first security hire responsibilities are. How do they prioritize? What do they prioritize?

    References:

    We will try and add information about all the references we make here. Please enter rabbit holes at will :)

    Building a product security program Some blogs on getting SOC2 certifications without too much redtape - ⁠RunReveal⁠, Fly.io⁠ Tracking Meaningful Security Product Metrics Build vs Buy Framework OpenAI Sora LLM Agents Can Autonomously Hack Websites Arcanum Information Security SecGPT in https://chat.openai.com/gpts

    Contacting Anshuman

    LinkedIn: ⁠⁠https://www.linkedin.com/in/anshumanbhartiya/⁠⁠ Twitter: ⁠⁠https://twitter.com/anshuman_bh⁠⁠ Website: ⁠⁠https://anshumanbhartiya.com/⁠⁠ Instagram: ⁠https://www.instagram.com/anshuman.bhartiya/⁠ YouTube: ⁠https://www.youtube.com/@AnshumanBhartiya⁠

    Contacting Sandesh

    LinkedIn: ⁠⁠https://www.linkedin.com/in/anandsandesh/⁠⁠ Twitter: ⁠⁠https://twitter.com/JubbaOnJeans/⁠⁠ Website: ⁠⁠https://boringappsec.substack.com/⁠⁠
  • Welcome to the Boring AppSec Podcast! In Episode 1, we discuss software inventories. What they are, why we need them, and what are our favorite ways to build them.

    References:

    We will try and add information about all the references we make here. Please enter rabbit holes at will :)

    Cartography - ⁠https://github.com/lyft/cartography⁠ GenAI + Cartography ⁠https://shinobi.security/#how-it-works⁠ ⁠https://github.com/samvas-codes/cspm-gpt⁠ Commercial asset inventory mentioned on the show: ⁠https://www.jupiterone.com/⁠ Talk by Sandesh and Satyaki on automating asset inventory generation at Razorpay: ⁠https://www.youtube.com/watch?v=8q42Pw9F44k&ab_channel=HasgeekTV⁠ XKCD about too many standards - ⁠https://m.xkcd.com/927/⁠ Arvind Narayanan on Gen AI chatbots and rock-paper-scissors: ⁠https://x.com/random_walker/status/1755684956502728969?s=20⁠ Emily Oster on parenting - ⁠https://emilyoster.net/⁠ . She has now moved her newsletter away from Substack. You can sign up at ⁠https://parentdata.org/⁠

    Contacting Anshuman

    LinkedIn: ⁠https://www.linkedin.com/in/anshumanbhartiya/⁠ Twitter: ⁠https://twitter.com/anshuman_bh⁠ Website: ⁠https://anshumanbhartiya.com/⁠ Instagram: https://www.instagram.com/anshuman.bhartiya/ YouTube: https://www.youtube.com/@AnshumanBhartiya

    Contacting Sandesh

    LinkedIn: ⁠https://www.linkedin.com/in/anandsandesh/⁠ Twitter: ⁠https://twitter.com/JubbaOnJeans/⁠ Website: ⁠https://boringappsec.substack.com/⁠