DevelopSec: Developing Security Awareness
Episodes
Newscast - Oct. 20, 2015
20 Oct 2015
Contributed by Lukas
Hi and welcome to the DevelopSec newscast for October 20th, 2015. I am James Jardine and I wanted to take a few moments to talk about some recent ne...
Newscast - Sept. 30, 2015
01 Oct 2015
Contributed by Lukas
James breaks down a few news stories from the previous week. The following stories were discussed, including some brief points. Microsoft Accidenta...
Newscast - Sept. 23, 2015
24 Sep 2015
Contributed by Lukas
James breaks down a few news stories from the previous week. The following stories were discussed, including some brief points.$1 million bounty for...
Ep. 30: HTTP Strict Transport Security (HSTS): Intro
18 Sep 2015
Contributed by Lukas
James talks about HTTP Strict Transport Security (HSTS) and what it is for. For more information, check out the corresponding post https://www.devel...
Ep. 29: FTC Start with Security Guidelines
30 Jul 2015
Contributed by Lukas
Just recently, the FTC released "Start with Security: A Guide for Busines" which is a set of 10 items businesses can do to help secure their...
Ep. 28: What is Penetration Testing
17 Jul 2015
Contributed by Lukas
In this episode, James Jardine talks about what penetration testing, "pen testing", is and how it really has a lot of meanings to different ...
Ep. 27: Importance of Security for BA and PM
18 Jun 2015
Contributed by Lukas
In this episode James covers some thoughts on how business analysts and project managers are crucial to the security role for applications. It doesn...
Ep. 26: The Importance of Security for QA
26 May 2015
Contributed by Lukas
QA plays a crucial role in testing for security flaws within applications. They have the Proximity, Knowledge of the Application and it is an extens...
Ep. 25: Static Analysis: Analyzing the Options
10 Apr 2015
Contributed by Lukas
Static analysis is an important part of the secure development lifecycle. There are some things to think about when you are considering a static ana...
Ep. 24: The Importance of Baselines
02 Apr 2015
Contributed by Lukas
Understanding baselines of our networks, applications, traffice, etc is important to identifying security issues. James Jardine shares some thoughts...
Ep. 23: 3rd Party CMS Security Thoughts
11 Mar 2015
Contributed by Lukas
CMS platforms are an easy way to get content to the internet, but we still have to consider security. James talks about some of the concerns and th...
Ep. 22: Black lists vs. White Lists
19 Feb 2015
Contributed by Lukas
I came across an interesting tweet https://twitter.com/suffert/status/567486188383379456 depicting a good example of a black list that didn't q...
Ep. 21: Sensitive Data and Storage
04 Feb 2015
Contributed by Lukas
James talks about the need for developers, QA, business analysts and project managers to understand the type of application they are creating and the ...
EP. 20: MoonPig Take-aways
09 Jan 2015
Contributed by Lukas
I discuss the lessons learned from the recent Moonpig security disclosure. This is full of information for a developer or QA tester. For more inf...
Ep. 19: Target Environments
30 Nov 2014
Contributed by Lukas
Are you looking to test our your security skills? There are lots of targets that are freely available to you that can be quite helpful. The good n...
Ep. 18: Planning for an Assessment
12 Oct 2014
Contributed by Lukas
No matter what size company you are, sooner or later you will be subject to some form of security assessment. Whether that is a penetration test, ar...
Ep. 17: Authorization
03 Oct 2014
Contributed by Lukas
Are you sure you are performing proper authorization checks everyplace? What does Authorization even mean? James Jardine talks about Authorization...
Ep. 16: The Cloud: Is it Safe?
05 Sep 2014
Contributed by Lukas
In this episode, James Jardine talks about the recent breaches regarding cloud services and whether or not we should be running for the hills. Lets ...
Ep. 15: Security Testing - QA can do this!!
22 Aug 2014
Contributed by Lukas
In this episode, James talks about security testing... scratch that, testing. There really is no difference between security testing and regular tes...
Ep. 14: Input Validation and Output Encoding
27 Jul 2014
Contributed by Lukas
The debate is out there, which is more important. I discuss what they are and how they both play a key role in securing an application.Send us a tex...
Ep. 13: Introduction to Cross Site Scripting
27 Jun 2014
Contributed by Lukas
This episode gives a high level overview of what XSS is and why it is of concern. Future episodes will dig deeper into the vulnerability.Send us a t...
DS: Ep 12: Ebay hacked. All about Cookies
27 May 2014
Contributed by Lukas
We discuss a little about eBay and their unfortunate hack, how sourceforge has upgraded their password storage and a lot about cookies. What are co...
Ep. 11: Not your Grandpa's Phishing
09 May 2014
Contributed by Lukas
In this episode, we talk about phishing. Mass email and spear phishing. What you should know about the topic and how to protect yourself.Send us a...
Ep. 10: Threat Modeling
25 Apr 2014
Contributed by Lukas
This episode introduces the new Microsoft Threat Modeling Tool 2014. No more requirement for Visio.. woohoo. Lots of talk about threat modeling...
Ep. 9: Windows XP and HeartBleed
11 Apr 2014
Contributed by Lukas
In this episode we take a look at the two hottest topics.. Windows XP End of Life and Heartbleed. If you haven't heard of either of these, your...
Ep. 8: Oversharing is not Caring
21 Mar 2014
Contributed by Lukas
In this episode, James Jardine talks about how oversharing with network shares is a big problem. Often times we open shares to too many people and w...
Ep. 7: Data Breaches
14 Mar 2014
Contributed by Lukas
We all see data breaches happen all the time, daily in most cases. James talks about how common this is, how companies can handle the situation and ...
Ep. 6: Mobile Security
07 Mar 2014
Contributed by Lukas
In this episode, James Jardine discusses mobile security and why we need to be thinking about it. Devices are Powerful these days and we do everythi...
Ep. 5: SQL Injection
21 Feb 2014
Contributed by Lukas
Here we are in 2014 and we still have SQL Injection issues. James Jardine discusses what SQL Injection is, how attackers take advantage of it and ho...
Ep. 4: Web Proxies
14 Feb 2014
Contributed by Lukas
In this episode, James Jardine talks about web proxies and how they are used. Whether you are a developer, QA tester, or pen tester, web proxies are...
Ep. 3:Connected System Security
07 Feb 2014
Contributed by Lukas
In this episode, James talks about these external systems that are connected to our networks. It is speculated that the Target breach was done throu...
Ep. 2: All About Passwords
31 Jan 2014
Contributed by Lukas
In this episode, James covers some interesting topics about passwords. Why we use them, what makes one better than another, some password managemen...
Ep. 1: Introduction to the Podcast
24 Jan 2014
Contributed by Lukas
This is the first episode of the DevelopSec podcast. The goal behind this podcast is to develop security awareness. Helping developers gain securi...