Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

DevelopSec: Developing Security Awareness

Technology News Education

Activity Overview

Episode publication activity over the past year

Episodes

Showing 101-133 of 133
«« ← Prev Page 2 of 2

Newscast - Oct. 20, 2015

20 Oct 2015

Contributed by Lukas

Hi and welcome to the DevelopSec newscast for October 20th, 2015.  I am James Jardine and I wanted to take a few moments to talk about some recent ne...

Newscast - Sept. 30, 2015

01 Oct 2015

Contributed by Lukas

James breaks down a few news stories from the previous week.  The following stories were discussed, including some brief points. Microsoft Accidenta...

Newscast - Sept. 23, 2015

24 Sep 2015

Contributed by Lukas

James breaks down a few news stories from the previous week.  The following stories were discussed, including some brief points.$1 million bounty for...

Ep. 30: HTTP Strict Transport Security (HSTS): Intro

18 Sep 2015

Contributed by Lukas

James talks about HTTP Strict Transport Security (HSTS) and what it is for.  For more information, check out the corresponding post https://www.devel...

Ep. 29: FTC Start with Security Guidelines

30 Jul 2015

Contributed by Lukas

Just recently, the FTC released "Start with Security: A Guide for Busines" which is a set of 10 items businesses can do to help secure their...

Ep. 28: What is Penetration Testing

17 Jul 2015

Contributed by Lukas

In this episode, James Jardine talks about what penetration testing, "pen testing", is and how it really has a lot of meanings to different ...

Ep. 27: Importance of Security for BA and PM

18 Jun 2015

Contributed by Lukas

In this episode James covers some thoughts on how business analysts and project managers are crucial to the security role for applications.  It doesn...

Ep. 26: The Importance of Security for QA

26 May 2015

Contributed by Lukas

QA plays a crucial role in testing for security flaws within applications.  They have the Proximity, Knowledge of the Application and it is an extens...

Ep. 25: Static Analysis: Analyzing the Options

10 Apr 2015

Contributed by Lukas

Static analysis is an important part of the secure development lifecycle.  There are some things to think about when you are considering a static ana...

Ep. 24: The Importance of Baselines

02 Apr 2015

Contributed by Lukas

Understanding baselines of our networks, applications, traffice, etc is important to identifying security issues.  James Jardine shares some thoughts...

Ep. 23: 3rd Party CMS Security Thoughts

11 Mar 2015

Contributed by Lukas

CMS platforms are an easy way to get content to the internet, but we still have to consider security.   James talks about some of the concerns and th...

Ep. 22: Black lists vs. White Lists

19 Feb 2015

Contributed by Lukas

I came across an interesting tweet https://twitter.com/suffert/status/567486188383379456  depicting a good example of a black list that didn't q...

Ep. 21: Sensitive Data and Storage

04 Feb 2015

Contributed by Lukas

James talks about the need for developers, QA, business analysts and project managers to understand the type of application they are creating and the ...

EP. 20: MoonPig Take-aways

09 Jan 2015

Contributed by Lukas

I discuss the lessons learned from the recent Moonpig security disclosure.  This is full of information for a developer or QA tester.   For more inf...

Ep. 19: Target Environments

30 Nov 2014

Contributed by Lukas

Are you looking to test our your security skills?  There are lots of targets that are freely available to you that can be quite helpful.  The good n...

Ep. 18: Planning for an Assessment

12 Oct 2014

Contributed by Lukas

No matter what size company you are, sooner or later you will be subject to some form of security assessment.  Whether that is a penetration test, ar...

Ep. 17: Authorization

03 Oct 2014

Contributed by Lukas

Are you sure you are performing proper authorization checks everyplace?  What does Authorization even mean?  James Jardine talks about Authorization...

Ep. 16: The Cloud: Is it Safe?

05 Sep 2014

Contributed by Lukas

In this episode, James Jardine talks about the recent breaches regarding cloud services and whether or not we should be running for the hills.  Lets ...

Ep. 15: Security Testing - QA can do this!!

22 Aug 2014

Contributed by Lukas

In this episode, James talks about security testing... scratch that, testing.  There really is no difference between security testing and regular tes...

Ep. 14: Input Validation and Output Encoding

27 Jul 2014

Contributed by Lukas

The debate is out there, which is more important.  I discuss what they are and how they both play a key role in securing an application.Send us a tex...

Ep. 13: Introduction to Cross Site Scripting

27 Jun 2014

Contributed by Lukas

This episode gives a high level overview of what XSS is and why it is of concern.  Future episodes will dig deeper into the vulnerability.Send us a t...

DS: Ep 12: Ebay hacked. All about Cookies

27 May 2014

Contributed by Lukas

We discuss a little about eBay and their unfortunate hack, how sourceforge has upgraded their password storage and a lot about cookies.   What are co...

Ep. 11: Not your Grandpa's Phishing

09 May 2014

Contributed by Lukas

In this episode, we talk about phishing.  Mass email and spear phishing.  What you should know about the topic and how to protect yourself.Send us a...

Ep. 10: Threat Modeling

25 Apr 2014

Contributed by Lukas

This episode introduces the new Microsoft Threat Modeling Tool 2014.  No more requirement for Visio..  woohoo.   Lots of talk about threat modeling...

Ep. 9: Windows XP and HeartBleed

11 Apr 2014

Contributed by Lukas

In this episode we take a look at the two hottest topics.. Windows XP End of Life and Heartbleed.  If you haven't heard of either of these, your...

Ep. 8: Oversharing is not Caring

21 Mar 2014

Contributed by Lukas

In this episode, James Jardine talks about how oversharing with network shares is a big problem.  Often times we open shares to too many people and w...

Ep. 7: Data Breaches

14 Mar 2014

Contributed by Lukas

We all see data breaches happen all the time, daily in most cases.  James talks about how common this is, how companies can handle the situation and ...

Ep. 6: Mobile Security

07 Mar 2014

Contributed by Lukas

In this episode, James Jardine discusses mobile security and why we need to be thinking about it.  Devices are Powerful these days and we do everythi...

Ep. 5: SQL Injection

21 Feb 2014

Contributed by Lukas

Here we are in 2014 and we still have SQL Injection issues.  James Jardine discusses what SQL Injection is, how attackers take advantage of it and ho...

Ep. 4: Web Proxies

14 Feb 2014

Contributed by Lukas

In this episode, James Jardine talks about web proxies and how they are used.  Whether you are a developer, QA tester, or pen tester, web proxies are...

Ep. 3:Connected System Security

07 Feb 2014

Contributed by Lukas

In this episode, James talks about these external systems that are connected to our networks.  It is speculated that the Target breach was done throu...

Ep. 2: All About Passwords

31 Jan 2014

Contributed by Lukas

In this episode, James covers some interesting topics about passwords.   Why we use them, what makes one better than another, some password managemen...

Ep. 1: Introduction to the Podcast

24 Jan 2014

Contributed by Lukas

This is the first episode of the DevelopSec podcast.  The goal behind this podcast is to develop security awareness.  Helping developers gain securi...

«« ← Prev Page 2 of 2