DevelopSec: Developing Security Awareness
Episodes
When Security Recommendations Miss The Point
30 Jan 2026
Contributed by Lukas
Ever read a security advisory that told you to “use a VPN” to protect a Bluetooth device? In this episode we talk about how bad or inaccurate rec...
Ep. 128: OWASP Top 10 2025
21 Jan 2026
Contributed by Lukas
In this episode James gives an overview of the new OWASP Top 10 2025. He shares some insights into the history, changes, and additional thoughts on th...
Ep. 127: Importance of Terminology
14 Jan 2026
Contributed by Lukas
In this episode, James talks about the difference between end-to-end encryption and the standard encryption in transit most web applications implement...
Ep. 126: Avoiding Panic and Misunderstandings with Proper Authentication Failure Reporting
06 Jan 2026
Contributed by Lukas
Have you ever felt that feeling of thinking your account has been compromised? It can be a scary feeling. But what about when it didn't really h...
Ep. 125: From Flat Tires to AppSec: The Power of Tools and Process
31 Dec 2025
Contributed by Lukas
In this episode, James shares a story about fixing a flat tire on an E-Scooter and how it relates to security. He shows how the combination of tools, ...
Ep. 124: Double-ClickJacking
24 Feb 2025
Contributed by Lukas
In this episode, I go over what Double-ClickJacking is and what you can potentially do about it to reduce the risk to your applications. Will this be...
Ep. 123: Goals of Security Culture - Sort of?
18 Feb 2025
Contributed by Lukas
In this episode, I talk about how security is a part of everyone's role and the labeling of "Security Culture". I share some ideas on h...
Ep. 122: Integrating Security Responsibilities into Development
10 Feb 2025
Contributed by Lukas
In this episode I talk about assigning responsibility for secure development and how the dev and security teams should be working together to accompli...
Ep. 121 - Evolving Ransomware: Unique Tactics for Payment
07 May 2024
Contributed by Lukas
In this episode I talk about the evolving world of ransomware. I discuss a few examples of unique tactics the malicious actors are using to put pressu...
Ep. 120: Addressing Root Cause - Vulnerable Components
31 Jan 2023
Contributed by Lukas
In this episode we talk about addressing the root cause of an issue versus the symptoms. How can the process of keeping application components updated...
Ep. 119: Risks of SpellCheck
19 Jan 2023
Contributed by Lukas
In this episode we talk about the spell check feature of the browser and how it could present a risk to sensitive data. Link to article reference...
Ep. 118: Log4J Sparking Thought on Vulnerable Components
19 Dec 2021
Contributed by Lukas
Log4J has been the talk of the town recently and everyone is focused on the technical details of the specific vulnerabilities found. In this episode, ...
Ep. 117: How Browsers are Helping with Security
09 Feb 2020
Contributed by Lukas
Chrome has announced a few changes that we need to watch out for in the near future. We previously talked about the default value for samesite that is...
Ep. 116: Chrome Retires XSS Auditor
15 Nov 2019
Contributed by Lukas
It was recently announced that Chrome was dropping the XSS Auditor in Chrome 78. What does that mean and how does that change things for you as a deve...
Ep. 115: Is CSRF Really Dead?
06 Nov 2019
Contributed by Lukas
In 2020, Chrome will default the SameSite attribute to Lax on all cookies. SameSite helps mitigate CSRF, but does that mean CSRF is Dead?For more info...
Ep. 114: Investing in People for Better Application Security
29 Oct 2019
Contributed by Lukas
In this episode, James talks about investing in the development teams to increase application security priorities.For more info go to https://www.deve...
Ep. 113: What is your mother's maiden name?
28 May 2019
Contributed by Lukas
In this episode, James talks about some of the risks and recommendations around security questions and their implementation. For more info go to http...
Ep. 112: Application Fingerprinting
22 Jan 2019
Contributed by Lukas
Does your application give away details about it server, framework, or other components? How is this information used by an attacker? Check out this...
Ep. 111: Authentication Alerts
14 Jan 2019
Contributed by Lukas
Would you know if someone authenticated to your account? With the breaches we see in the news, and attacks like credential stuffing, there must be a w...
Ep. 110: Implementation Matters
07 Jan 2019
Contributed by Lukas
James discusses how implementation matters with security controls and how it changes priorities. This came about after reading the following story: ...
Ep. 109: 2018 Reflection
02 Jan 2019
Contributed by Lukas
I talk about some of what happened in 2018 and what I am looking to do in 2019. I also ask you to think about your previous year and goals. I also tal...
Ep. 108: Dunkin Donuts Breach, Maybe??
12 Dec 2018
Contributed by Lukas
In this episode James talk about the Dunkin Donuts Perks breach. This is an interesting situation as the accounts were access using the victim's ...
Ep. 107: Credential Stuffing
09 Nov 2018
Contributed by Lukas
In this episode James talks about what credential stuffing is, how if affects your apps, and how you can look to defend against it. For more info g...
Ep. 106: Facebook Breach Take-aways and Insights
04 Oct 2018
Contributed by Lukas
James talks about the Facebook breach and shares some insights into how you can take steps to prevent this type of incident in your applications. F...
Ep. 105: Interview with Eric Johnson
20 Sep 2018
Contributed by Lukas
I sit down with Eric Johnson to talk about security in the IDE and other fun topics. A bit longer than usual, but full of great information. You can ...
Ep. 104: Securing Devops with Julien Vehent
30 Aug 2018
Contributed by Lukas
James sits down with Julien Vehent to discuss his new book "Securing DevOps" and talk about security in a devOps world. Julien (@jvehent) i...
Ep. 103: Is 3rd Party Authentication Right For Your Application?
16 Aug 2018
Contributed by Lukas
The headlines are filled with credential breaches. One way to avoid being those headlines is to not store credentials. Instead, use a 3rd party to a...
Ep. 102: Intro to Web Security Policies
26 Jun 2018
Contributed by Lukas
In this episode James introduces us to the idea of web security policies stored in a security.txt file. We have talked about vulnerability disclosure ...
Ep. 101: You're not always right and that is ok
18 Jun 2018
Contributed by Lukas
In this episode, James shares a story of learning from a mistake and how we can't be right every time. Hear what he learned and how you can learn...
Ep. 100: Choosing Security Tools
07 Jun 2018
Contributed by Lukas
In this episode we talk about choosing the right security tools for your environment. There are lots of vendors offering solutions to help identify se...
Ep. 99: Shifting Left in the SDLC
30 May 2018
Contributed by Lukas
In this episode, James talks about what it means to shift left in the SDLC. For more info go to https://www.developsec.com or follow us on twitter ...
Ep. 98: Efail and News Hype
15 May 2018
Contributed by Lukas
In this episode we talk about efail and the HYPE around security news. For more info go to https://www.developsec.com or follow us on twitter (...
EP. 97: Gmail / Netflix Potential Scam
23 Apr 2018
Contributed by Lukas
** Check out our new Live Fundamentals of Application Security training starting on May 1, 2018. Don't wait to sign up. For schedules and informa...
Ep. 96: Security Flaws as Defects
16 Apr 2018
Contributed by Lukas
In this episode we talk about treating security flaws as defects and embedded vs. built-in security. Do you treat security flaws differently? What bar...
Ep. 95: MyFitnessPal Breach Take-Aways
09 Apr 2018
Contributed by Lukas
In this episode we talk about the MyFitnessPal breach and some of the key points that we as developers, security, and users can take away from it. ...
Ep. 94: Penetration Testing
02 Apr 2018
Contributed by Lukas
In this episode we talk about penetration testing and what you need to know to get the most out of the activity. Tune in to hear some of our thoughts ...
Ep. 93: Code Review
09 Mar 2018
Contributed by Lukas
In this episode we talk about secure code review with a mention of static analysis. Do you know the difference? What is the issue of doing one over th...
Ep. 92: 2-Factor Authentication
06 Mar 2018
Contributed by Lukas
In this episode James talks about 2-factor authentication, why we use it, and maybe why we don't. Is your 2-factor implementation getting in your...
DevelopSec Podcast #91 - OWASP Top 10 2017 Thoughts
09 Feb 2018
Contributed by Lukas
The new OWASP Top 10 2017 is out. We look at some of the changes and how you can effectively use the list to better your security program. We are als...
Ep. 90: 5 Steps to Help Secure Your Database
16 Jan 2018
Contributed by Lukas
James sits down with Perry Krug, from Couchbase to discuss some important steps to take to secure your database. Perry Krug - https://twitter.c...
Ep. 89: New Year's Resolutions
04 Jan 2018
Contributed by Lukas
Welcome to 2018! Another year down and time for many of us to start making promises to ourselves of things we will start doing in this new year. In ...
Ep. 88: Meteor Security with Tim Medin
11 Dec 2017
Contributed by Lukas
In this episode, James talks with Tim Medin regarding Meteor and security. If you develop with Meteor or have to test it, there is a lot of informatio...
Ep. 87: Apple Sign-in Bug Take-Aways
01 Dec 2017
Contributed by Lukas
You have heard about the Apple Sign-in Bug on High Sierra. Now lets talk about how we can use this example to better our current development processes...
Ep. 86: Vulnerable 3rd Party Components
23 Nov 2017
Contributed by Lukas
In this episode, James talks the use of 3rd party components and how to handle determining if they are vulnerable or not.Links: OWASP Dependancy Chec...
Ep. 85: Open Redirect Revisited
17 Nov 2017
Contributed by Lukas
In this episode, James talks about open redirect and why it matters from a security perspective. He also shows how this information can be used in you...
Ep. 84: Understanding the Technology
31 Oct 2017
Contributed by Lukas
You know your development language and platform, but do you really know the ins and outs of web application technology? How well do you know HTTP, HTM...
Ep. 83: Authorization Overview
18 Oct 2017
Contributed by Lukas
In this episode, James talks about authorization and some common areas where it poses a risk. He also goes over some techniques to help test authoriza...
Ep. 82: Equifax Take-aways
29 Sep 2017
Contributed by Lukas
The Equifax breach was a major news story. James talks about some of the security controls mentioned and how to start a conversation within your organ...
Ep. 81: JavaScript in HREF and SRC (XSS)
18 Sep 2017
Contributed by Lukas
We talk about cross-site scripting (XSS) all the time, but often overlook the ability to use javascript: in anchor tags. James talks about this uniq...
Ep. 80: Understanding Security of Your Platforms
23 Aug 2017
Contributed by Lukas
We use a lot of platforms and frameworks when we develop an application. These platforms may provide security features, but do you know which ones? Ja...
Ep. 79: Marketing with USB Drives
31 Jul 2017
Contributed by Lukas
James talks about the risk of USB thumb drives and their risk using the recent BCBS marketing campaign as an example. (http://www.fiercehealthcare.com...
Ep. 78: MySpace Lessons - Looking At Account Recovery
24 Jul 2017
Contributed by Lukas
James talks about a recent vulnerability report regarding MySpace's Account Recovery system (https://www.wired.com/story/myspace-security-account...
Ep. 77: Interactive Application Security Testing
07 Jul 2017
Contributed by Lukas
In this episode, James talks about Interactive Application Security Testing, or IAST. It is a sort of hybrid approach that is similar to both dynamic ...
Ep. 76: Validation - Client vs. Server
19 Jun 2017
Contributed by Lukas
Are you thinking about client vs. server-side input validation? Curious why each is important and when to use them? James talks about the basic co...
Ep. 75: IAM with Geurt van Wijk
05 Jun 2017
Contributed by Lukas
In this episode I sit down with Geurt van Wijk from IDdriven to discuss IAM and IDaaS. Geurt has many years of experience around Identity and shares s...
Ep. 74: Audio Driver Key Logger Lessons Learned
24 May 2017
Contributed by Lukas
It was recently reported that an audio driver on HP systems was logging key strokes to a local file. Accidental? Malicious? Instead, we talk abo...
Ep. 73: Identity with Vittorio Bertocci
17 May 2017
Contributed by Lukas
I sat down with Vittorio Bertocci from Microsoft at the Microsoft Build 2017 conference in Seattle Washington. Vittorio shared some great insights i...
Ep. 72: Where to Perform Output Encoding
11 May 2017
Contributed by Lukas
Over the years I have had many people ask about encoding before storing data in the database. Here are my thoughts and recommendations.For more info...
Ep. 71: Sub Resource Integrity
17 Apr 2017
Contributed by Lukas
Do you use hosted content on a CDN? How do you know the file hasn't been modified? James describes Sub Resource Integrity and how it is used to...
Ep. 70: Considering security when selecting an application platform
27 Mar 2017
Contributed by Lukas
Do you struggle with trying to pick the most secure application platform? Are you focusing on the right questions? James talks about ways to look at a...
Ep. 69: Concurrent User Sessions
10 Mar 2017
Contributed by Lukas
Do you allow users to login into their accounts across multiple browsers or devices? Does this raise a security concern? James talks about how to hand...
Ep. 68: How the AWS disruption can help us
03 Mar 2017
Contributed by Lukas
I am sure you have heard about the AWS service disruption that occurred. Have you seen how we can learn from this when we look at our own tools and ...
Ep. 67: Clearing up HTTPOnly and Secure Cookie Attributes
24 Feb 2017
Contributed by Lukas
I hear a lot of people struggling with HTTPOnly and Secure attributes on cookies. The names may be confusing to some. Change your viewpoint and it may...
Ep. 66: Forgot Username
22 Feb 2017
Contributed by Lukas
We always talk about Forgot Password... But what about Forgot Username? Listen in as James discusses why protecting this functionality is important an...
Ep. 65: Security Questions: Good or Bad?
15 Feb 2017
Contributed by Lukas
In this episode, James talks about security questions, or secret questions. We see them used in many different places. People complain they are horrib...
Ep. 64: Using Stolen Passwords to Protect User Accounts
23 Jan 2017
Contributed by Lukas
A few months ago, it was announced that some companies buy stolen passwords off of the black market to help protect their users. This is done by det...
Ep. 63: Remember Me Feature: Security Considerations
17 Jan 2017
Contributed by Lukas
Are you, or have you, implemented a remember me feature for your application? What do you remember, username, password, or both? James talks about...
Ep. 62: MongoDB Ransomware Attacks
10 Jan 2017
Contributed by Lukas
Do you use MongoDB? If so, is it exposed to the internet? Recent news (listed below) had shown that a large number of MongoDB instances are being ...
Ep. 61: Multi-factor Authentication
05 Jan 2017
Contributed by Lukas
Implementing multi-factor authentication isn't just about a second factor. There are many considerations that need to be included. One in par...
Ep. 60: Yahoo Breach Takeaways
15 Dec 2016
Contributed by Lukas
Yahoo has announced yet another breach from back in 2013 affecting a very large number of user accounts. https://investor.yahoo.net/ReleaseDetail.cfm?...
Ep. 59: All About Cookie Protection
14 Dec 2016
Contributed by Lukas
It is the holiday season. It is appropriate to talk about cookies. Not the kind that you bake, but the ones in your applications. James talks ab...
Ep. 58: "Untrusted" Data
16 Nov 2016
Contributed by Lukas
Have you heard someone mention "untrusted" data? Applications take data from multiple data sources and we are often confused on what shoul...
Ep. 57: Source Code Review
04 Nov 2016
Contributed by Lukas
Are you an organization looking to do source code review? Are you trying to hire a pen tester with source code review as a duty? James talks about...
Ep. 56: Security Contacts
26 Oct 2016
Contributed by Lukas
Do you have a clear path for users to contact you about potential security issues in your application or device? Is there a potential for the commun...
Ep. 55: Scoping an application security assessment (Applications)
28 Sep 2016
Contributed by Lukas
Having a penetration test performed against your applications? Do you have mobile and web applications performing the same functionality? James ta...
Ep. 54: WAFs and Pen Testing
21 Sep 2016
Contributed by Lukas
Your pen tester want you to white list them in your WAF? What should you do? Why do they ask? James breaks it down for you in this episode.For m...
Ep. 53: Chrome Changing Secure Notifications
15 Sep 2016
Contributed by Lukas
We talk HTTP/HTTPS all the time. Google just announced that in January they are going to change how they display their secure/not secure indicators ...
Login Forms and HTTPS
07 Sep 2016
Contributed by Lukas
Are your login forms secure? Are you sure? In this episode James talks about potential risks with presenting your login forms when using HTTPS and...
Ep. 52: Importance of UI to Security
05 Sep 2016
Contributed by Lukas
The user interface plays a big part in the security of an application. We often only look at flaws such as XSS, but here James provides an example o...
Ep. 51: Everything is a target
29 Aug 2016
Contributed by Lukas
James discusses how all applications, big or small, are a potential target and need to have secure coding practices. We often only look at our big a...
Ep. 50: How Serious is Username Enumeration
28 Jul 2016
Contributed by Lukas
In this episode, James talks about what Username Enumeration is, how it can be used by attackers, and some ways to help reduce the risk of it. For ...
Ep. 49: Should Password Change Invalidate Access Tokens?
25 Jul 2016
Contributed by Lukas
Interesting question was raised around changing a password and the need to invalidate all the access tokens for the associated mobile devices. James...
Ep. 48: Pokemon Go Security Discussions
18 Jul 2016
Contributed by Lukas
Pokemon Go has taken the world by storm and as always, it brings up some things to talk about regarding security. In this episode James talks about ...
Ep. 47: Account Lockouts and auto-unlock
17 Jun 2016
Contributed by Lukas
A question came in regarding auto-unlock of accounts and account lockout in general. James discusses his thoughts on this process and how he approac...
Ep. 46: Password Confirm Boxes
10 Jun 2016
Contributed by Lukas
A question came in around the need for the password confirm box on registration screens and the security implications. In this episode I respond to ...
Ep. 45: The importance of WHY
03 Jun 2016
Contributed by Lukas
We are too quick to just give generic recommendations for resolving security vulnerabilities. We need to make sure that the application teams unders...
Ep. 44: "We don't support Macs"
27 May 2016
Contributed by Lukas
When a developer was presented with a but they tried to say that it wasn't an issue because it was found by a tester using a Mac. "We don&...
Ep. 43: Reflecting on Current AppSec Training
21 May 2016
Contributed by Lukas
James reflects on the current way we expect application teams to get security training and potential short falls. Is there a better way? Listen as...
Ep. 42: The Need for Better Secure Code Examples
24 Apr 2016
Contributed by Lukas
How do you get your secure coding information? Do you pull code snippets from the internet? Who doesn't. How many of those actually use sec...
Ep. 41: Why You Need an Application Inventory
19 Apr 2016
Contributed by Lukas
Do you use an application inventory in your application security program? James discusses what an application inventory is and why it is important. ...
Ep. 40: Getting More Value from Pen Tests
08 Mar 2016
Contributed by Lukas
Penetration tests provide a measuring stick for security, but are you missing out on additional value? James discusses ways to use the pen test resu...
Ep. 39: Authentication
29 Feb 2016
Contributed by Lukas
James discusses what authentication is and some things to look out for. For more info go to https://www.developsec.com or follow us on twitter (@...
Ep. 38: Static Analysis: Tips for Successful Program
07 Feb 2016
Contributed by Lukas
In this episode, James Jardine talks about some of the things you need to consider when trying to implement a static analysis program. It is more than...
Ep. 37: CSRF Chaining
26 Jan 2016
Contributed by Lukas
James Jardine discusses CSRF chaining, using the combination of multiple CSRF requests to perform a task. Typically we believe that CSRF can only be d...
Ep. 36: Intro to Cross Site Request Forgery (CSRF)
07 Jan 2016
Contributed by Lukas
In this episode, James talks about what CSRF is, why it is a risk, and different ways to protect against it. CSRF is #8 on the OWASP Top 10 https://...
Ep. 35: An Introduction to Open Redirects
15 Dec 2015
Contributed by Lukas
James discusses Open Redirects, or on the OWASP Top 10 what is referred to as Unvalidated Redirects and Forwards (https://www.owasp.org/index.php/Top_...
Ep. 34: Importance of Hacking
11 Dec 2015
Contributed by Lukas
James discusses Hacking, what is it, why is it important. It is more than what you see in the media of the bad guys hacking computers. It is a cur...
Ep. 33: Holiday Gift Security Considerations
24 Nov 2015
Contributed by Lukas
James discussing some things to consider this holiday season when searching for that perfect gift. It is important to understand the privacy policy ...
Ep. 32: Dynamic Analysis: An Overview
21 Nov 2015
Contributed by Lukas
James Jardine provides an overview of Dynamic Analysis and why it is important. Like any automation, there are pros and cons. Listen to find out ...
Ep. 31: Response Splitting and Header Injection
09 Nov 2015
Contributed by Lukas
Join James Jardine as he discusses what Response Splitting/Header Injection is and how it works. He also discusses how ASP.Net helps defend against ...